A malware of the gozi group, developed on the base of isfb. It uses Office Macros and PowerShell in documents distributed in e-mail messages.
rule win_powersniff_auto { meta: author = "Felix Bilstein - yara-signator at cocacoding dot com" date = "2023-07-11" version = "1" description = "Detects win.powersniff." info = "autogenerated rule brought to you by yara-signator" tool = "yara-signator v0.6.0" signator_config = "callsandjumps;datarefs;binvalue" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.powersniff" malpedia_rule_date = "20230705" malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41" malpedia_version = "20230715" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" /* DISCLAIMER * The strings used in this rule have been automatically selected from the * disassembly of memory dumps and unpacked files, using YARA-Signator. * The code and documentation is published here: * https://github.com/fxb-cocacoding/yara-signator * As Malpedia is used as data source, please note that for a given * number of families, only single samples are documented. * This likely impacts the degree of generalization these rules will offer. * Take the described generation method also into consideration when you * apply the rules in your use cases and assign them confidence levels. */ strings: $sequence_0 = { 720c c705????????02000000 eb11 3d00400000 720a c705????????03000000 } // n = 6, score = 100 // 720c | jb 0xe // c705????????02000000 | // eb11 | jmp 0x13 // 3d00400000 | cmp eax, 0x4000 // 720a | jb 0xc // c705????????03000000 | $sequence_1 = { 83ec5c a1???????? 56 57 33f6 6a44 8945f8 } // n = 7, score = 100 // 83ec5c | sub esp, 0x5c // a1???????? | // 56 | push esi // 57 | push edi // 33f6 | xor esi, esi // 6a44 | push 0x44 // 8945f8 | mov dword ptr [ebp - 8], eax $sequence_2 = { e9???????? 51 53 55 57 } // n = 5, score = 100 // e9???????? | // 51 | push ecx // 53 | push ebx // 55 | push ebp // 57 | push edi $sequence_3 = { ff7614 ff15???????? 5f 5e 5d c21400 } // n = 6, score = 100 // ff7614 | push dword ptr [esi + 0x14] // ff15???????? | // 5f | pop edi // 5e | pop esi // 5d | pop ebp // c21400 | ret 0x14 $sequence_4 = { 897c2410 393d???????? 7578 8b35???????? } // n = 4, score = 100 // 897c2410 | mov dword ptr [esp + 0x10], edi // 393d???????? | // 7578 | jne 0x7a // 8b35???????? | $sequence_5 = { 0fb6f3 8b5df4 c1ea18 8b149590780010 3314b5907c0010 c1eb08 } // n = 6, score = 100 // 0fb6f3 | movzx esi, bl // 8b5df4 | mov ebx, dword ptr [ebp - 0xc] // c1ea18 | shr edx, 0x18 // 8b149590780010 | mov edx, dword ptr [edx*4 + 0x10007890] // 3314b5907c0010 | xor edx, dword ptr [esi*4 + 0x10007c90] // c1eb08 | shr ebx, 8 $sequence_6 = { 7f36 03ce 813950450000 752c } // n = 4, score = 100 // 7f36 | jg 0x38 // 03ce | add ecx, esi // 813950450000 | cmp dword ptr [ecx], 0x4550 // 752c | jne 0x2e $sequence_7 = { 8b75f0 33349d90840010 8bda 3330 c1eb08 8975f0 } // n = 6, score = 100 // 8b75f0 | mov esi, dword ptr [ebp - 0x10] // 33349d90840010 | xor esi, dword ptr [ebx*4 + 0x10008490] // 8bda | mov ebx, edx // 3330 | xor esi, dword ptr [eax] // c1eb08 | shr ebx, 8 // 8975f0 | mov dword ptr [ebp - 0x10], esi $sequence_8 = { 8d442410 50 8d442418 50 8974241c } // n = 5, score = 100 // 8d442410 | lea eax, [esp + 0x10] // 50 | push eax // 8d442418 | lea eax, [esp + 0x18] // 50 | push eax // 8974241c | mov dword ptr [esp + 0x1c], esi $sequence_9 = { eb51 6a00 68424d5352 8d45fc 50 } // n = 5, score = 100 // eb51 | jmp 0x53 // 6a00 | push 0 // 68424d5352 | push 0x52534d42 // 8d45fc | lea eax, [ebp - 4] // 50 | push eax condition: 7 of them and filesize < 90112 }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below.
Please propose all changes regarding references on the Malpedia library page
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY