Actor(s): GALLIUM, Molerats, Mustang Panda, Nightshade Panda, Pirate Panda, Stone Panda, TA428, Temper Panda
There is no description at this point.
rule win_poison_ivy_auto { meta: author = "Felix Bilstein - yara-signator at cocacoding dot com" date = "2023-12-06" version = "1" description = "Detects win.poison_ivy." info = "autogenerated rule brought to you by yara-signator" tool = "yara-signator v0.6.0" signator_config = "callsandjumps;datarefs;binvalue" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.poison_ivy" malpedia_rule_date = "20231130" malpedia_hash = "fc8a0e9f343f6d6ded9e7df1a64dac0cc68d7351" malpedia_version = "20230808" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" /* DISCLAIMER * The strings used in this rule have been automatically selected from the * disassembly of memory dumps and unpacked files, using YARA-Signator. * The code and documentation is published here: * https://github.com/fxb-cocacoding/yara-signator * As Malpedia is used as data source, please note that for a given * number of families, only single samples are documented. * This likely impacts the degree of generalization these rules will offer. * Take the described generation method also into consideration when you * apply the rules in your use cases and assign them confidence levels. */ strings: $sequence_0 = { ff9681000000 80beaf08000001 7507 b902000080 eb05 } // n = 5, score = 100 // ff9681000000 | call dword ptr [esi + 0x81] // 80beaf08000001 | cmp byte ptr [esi + 0x8af], 1 // 7507 | jne 9 // b902000080 | mov ecx, 0x80000002 // eb05 | jmp 7 $sequence_1 = { b902000080 eb05 b901000080 8d45fc } // n = 4, score = 100 // b902000080 | mov ecx, 0x80000002 // eb05 | jmp 7 // b901000080 | mov ecx, 0x80000001 // 8d45fc | lea eax, [ebp - 4] $sequence_2 = { 51 ff5635 68ff000000 8d86b1060000 } // n = 4, score = 100 // 51 | push ecx // ff5635 | call dword ptr [esi + 0x35] // 68ff000000 | push 0xff // 8d86b1060000 | lea eax, [esi + 0x6b1] $sequence_3 = { 50 6a01 6a00 8d86120e0000 50 ff75fc } // n = 6, score = 100 // 50 | push eax // 6a01 | push 1 // 6a00 | push 0 // 8d86120e0000 | lea eax, [esi + 0xe12] // 50 | push eax // ff75fc | push dword ptr [ebp - 4] $sequence_4 = { b901000080 8d45fc 50 683f000f00 6a00 57 51 } // n = 7, score = 100 // b901000080 | mov ecx, 0x80000001 // 8d45fc | lea eax, [ebp - 4] // 50 | push eax // 683f000f00 | push 0xf003f // 6a00 | push 0 // 57 | push edi // 51 | push ecx $sequence_5 = { 51 57 ff9681000000 8d45fc } // n = 4, score = 100 // 51 | push ecx // 57 | push edi // ff9681000000 | call dword ptr [esi + 0x81] // 8d45fc | lea eax, [ebp - 4] $sequence_6 = { 8d86120e0000 50 ff75fc ff563d ff75fc ff5631 } // n = 6, score = 100 // 8d86120e0000 | lea eax, [esi + 0xe12] // 50 | push eax // ff75fc | push dword ptr [ebp - 4] // ff563d | call dword ptr [esi + 0x3d] // ff75fc | push dword ptr [ebp - 4] // ff5631 | call dword ptr [esi + 0x31] condition: 7 of them and filesize < 204800 }
rule win_poison_ivy_w0 { meta: author = "Matthew Ulm" source = "https://github.com/mattulm/sfiles_yara/blob/master/malware/pivy.yar" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.poison_ivy" malpedia_version = "20170517" malpedia_sharing = "TLP:WHITE" malpedia_license = "" strings: // presence of pivy in memory $a = {00 00 00 00 00 00 00 00 00 00 00 53 74 75 62 50 61 74 68 00} condition: any of them }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below. Changes regarding references should be proposed on the Malpedia library page.
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY