SYMBOLCOMMON_NAMEaka. SYNONYMS
win.poohmilk (Back to overview)

PoohMilk Loader

Actor(s): APT37


There is no description at this point.

References
2018-01-16Cisco TalosWarren Mercer, Paul Rascagnères, Jungsoo An
@online{mercer:20180116:korea:f462331, author = {Warren Mercer and Paul Rascagnères and Jungsoo An}, title = {{Korea In The Crosshairs}}, date = {2018-01-16}, organization = {Cisco Talos}, url = {http://blog.talosintelligence.com/2018/01/korea-in-crosshairs.html}, language = {English}, urldate = {2020-01-06} } Korea In The Crosshairs
Freenki Loader PoohMilk Loader RokRAT APT37
2017-10-05Palo Alto Networks Unit 42Juan Cortes, Esmid Idrizovic
@online{cortes:20171005:freemilk:a929f1b, author = {Juan Cortes and Esmid Idrizovic}, title = {{FreeMilk: A Highly Targeted Spear Phishing Campaign}}, date = {2017-10-05}, organization = {Palo Alto Networks Unit 42}, url = {https://researchcenter.paloaltonetworks.com/2017/10/unit42-freemilk-highly-targeted-spear-phishing-campaign/}, language = {English}, urldate = {2019-12-20} } FreeMilk: A Highly Targeted Spear Phishing Campaign
Freenki Loader PoohMilk Loader
Yara Rules
[TLP:WHITE] win_poohmilk_auto (20220411 | Detects win.poohmilk.)
rule win_poohmilk_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-04-08"
        version = "1"
        description = "Detects win.poohmilk."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.poohmilk"
        malpedia_rule_date = "20220405"
        malpedia_hash = "ecd38294bd47d5589be5cd5490dc8bb4804afc2a"
        malpedia_version = "20220411"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 0bfa 0fb7ff 89bd34ffffff 3d00040000 0f83e0000000 ba01000000 }
            // n = 6, score = 200
            //   0bfa                 | or                  edi, edx
            //   0fb7ff               | movzx               edi, di
            //   89bd34ffffff         | mov                 dword ptr [ebp - 0xcc], edi
            //   3d00040000           | cmp                 eax, 0x400
            //   0f83e0000000         | jae                 0xe6
            //   ba01000000           | mov                 edx, 1

        $sequence_1 = { 6a00 6a01 6800000080 8d85ecfdffff 50 ff15???????? }
            // n = 6, score = 200
            //   6a00                 | push                0
            //   6a01                 | push                1
            //   6800000080           | push                0x80000000
            //   8d85ecfdffff         | lea                 eax, dword ptr [ebp - 0x214]
            //   50                   | push                eax
            //   ff15????????         |                     

        $sequence_2 = { b805050505 c7412c20010000 c7413020000000 8981e00d0000 8981e40d0000 8981e80d0000 }
            // n = 6, score = 200
            //   b805050505           | mov                 eax, 0x5050505
            //   c7412c20010000       | mov                 dword ptr [ecx + 0x2c], 0x120
            //   c7413020000000       | mov                 dword ptr [ecx + 0x30], 0x20
            //   8981e00d0000         | mov                 dword ptr [ecx + 0xde0], eax
            //   8981e40d0000         | mov                 dword ptr [ecx + 0xde4], eax
            //   8981e80d0000         | mov                 dword ptr [ecx + 0xde8], eax

        $sequence_3 = { 83fa02 0f8d99000000 8b8d74ffffff 8bc3 25ff030000 0fbf8441000f0000 85c0 }
            // n = 7, score = 200
            //   83fa02               | cmp                 edx, 2
            //   0f8d99000000         | jge                 0x9f
            //   8b8d74ffffff         | mov                 ecx, dword ptr [ebp - 0x8c]
            //   8bc3                 | mov                 eax, ebx
            //   25ff030000           | and                 eax, 0x3ff
            //   0fbf8441000f0000     | movsx               eax, word ptr [ecx + eax*2 + 0xf00]
            //   85c0                 | test                eax, eax

        $sequence_4 = { ff15???????? 8b8d60f3ffff 68???????? 51 8bf0 }
            // n = 5, score = 200
            //   ff15????????         |                     
            //   8b8d60f3ffff         | mov                 ecx, dword ptr [ebp - 0xca0]
            //   68????????           |                     
            //   51                   | push                ecx
            //   8bf0                 | mov                 esi, eax

        $sequence_5 = { 899d2cffffff 89bd38ffffff c78568ffffffffffffff 89bd60ffffff 899558ffffff 7405 83c9ff }
            // n = 7, score = 200
            //   899d2cffffff         | mov                 dword ptr [ebp - 0xd4], ebx
            //   89bd38ffffff         | mov                 dword ptr [ebp - 0xc8], edi
            //   c78568ffffffffffffff     | mov    dword ptr [ebp - 0x98], 0xffffffff
            //   89bd60ffffff         | mov                 dword ptr [ebp - 0xa0], edi
            //   899558ffffff         | mov                 dword ptr [ebp - 0xa8], edx
            //   7405                 | je                  7
            //   83c9ff               | or                  ecx, 0xffffffff

        $sequence_6 = { 03c8 0fb64605 03d9 03c8 0fb64606 }
            // n = 5, score = 200
            //   03c8                 | add                 ecx, eax
            //   0fb64605             | movzx               eax, byte ptr [esi + 5]
            //   03d9                 | add                 ebx, ecx
            //   03c8                 | add                 ecx, eax
            //   0fb64606             | movzx               eax, byte ptr [esi + 6]

        $sequence_7 = { c70234000000 e9???????? 8b8574ffffff c78568ffffff02000000 c70009000000 e9???????? }
            // n = 6, score = 200
            //   c70234000000         | mov                 dword ptr [edx], 0x34
            //   e9????????           |                     
            //   8b8574ffffff         | mov                 eax, dword ptr [ebp - 0x8c]
            //   c78568ffffff02000000     | mov    dword ptr [ebp - 0x98], 2
            //   c70009000000         | mov                 dword ptr [eax], 9
            //   e9????????           |                     

        $sequence_8 = { 8b4de4 83c40c 6bc930 8975e0 8db1107c4100 8975e4 eb2b }
            // n = 7, score = 200
            //   8b4de4               | mov                 ecx, dword ptr [ebp - 0x1c]
            //   83c40c               | add                 esp, 0xc
            //   6bc930               | imul                ecx, ecx, 0x30
            //   8975e0               | mov                 dword ptr [ebp - 0x20], esi
            //   8db1107c4100         | lea                 esi, dword ptr [ecx + 0x417c10]
            //   8975e4               | mov                 dword ptr [ebp - 0x1c], esi
            //   eb2b                 | jmp                 0x2d

        $sequence_9 = { 0f8d99000000 8b8d74ffffff 8bc3 25ff030000 0fbf8441000f0000 85c0 7811 }
            // n = 7, score = 200
            //   0f8d99000000         | jge                 0x9f
            //   8b8d74ffffff         | mov                 ecx, dword ptr [ebp - 0x8c]
            //   8bc3                 | mov                 eax, ebx
            //   25ff030000           | and                 eax, 0x3ff
            //   0fbf8441000f0000     | movsx               eax, word ptr [ecx + eax*2 + 0xf00]
            //   85c0                 | test                eax, eax
            //   7811                 | js                  0x13

    condition:
        7 of them and filesize < 245760
}
Download all Yara Rules