SYMBOLCOMMON_NAMEaka. SYNONYMS
win.redpepper (Back to overview)

REDPEPPER

aka: Adupib

Actor(s): PLATINUM


There is no description at this point.

References
2019-06-05Twitter (@ItsReallyNick)Nick Carr
@online{carr:20190605:malware:a6892ae, author = {Nick Carr}, title = {{Tweet on Malware Sample}}, date = {2019-06-05}, organization = {Twitter (@ItsReallyNick)}, url = {https://twitter.com/ItsReallyNick/status/1136502701301346305}, language = {English}, urldate = {2020-01-07} } Tweet on Malware Sample
REDPEPPER REDSALT
Yara Rules
[TLP:WHITE] win_redpepper_auto (20201014 | autogenerated rule brought to you by yara-signator)
rule win_redpepper_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-10-14"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.5.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.redpepper"
        malpedia_rule_date = "20201014"
        malpedia_hash = "a7e3bd57eaf12bf3ea29a863c041091ba3af9ac9"
        malpedia_version = "20201014"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 8b742414 6a0f f7d1 49 56 8be9 }
            // n = 6, score = 300
            //   8b742414             | mov                 esi, dword ptr [esp + 0x14]
            //   6a0f                 | push                0xf
            //   f7d1                 | not                 ecx
            //   49                   | dec                 ecx
            //   56                   | push                esi
            //   8be9                 | mov                 ebp, ecx

        $sequence_1 = { 8b500c 41 83f904 8b12 8a540aff }
            // n = 5, score = 300
            //   8b500c               | mov                 edx, dword ptr [eax + 0xc]
            //   41                   | inc                 ecx
            //   83f904               | cmp                 ecx, 4
            //   8b12                 | mov                 edx, dword ptr [edx]
            //   8a540aff             | mov                 dl, byte ptr [edx + ecx - 1]

        $sequence_2 = { c70603000000 5f 5e 5d b801000000 }
            // n = 5, score = 300
            //   c70603000000         | mov                 dword ptr [esi], 3
            //   5f                   | pop                 edi
            //   5e                   | pop                 esi
            //   5d                   | pop                 ebp
            //   b801000000           | mov                 eax, 1

        $sequence_3 = { 742f 85ed 7526 833e02 7509 5f }
            // n = 6, score = 300
            //   742f                 | je                  0x31
            //   85ed                 | test                ebp, ebp
            //   7526                 | jne                 0x28
            //   833e02               | cmp                 dword ptr [esi], 2
            //   7509                 | jne                 0xb
            //   5f                   | pop                 edi

        $sequence_4 = { 03c3 8944242c c6000e 8b44242c 40 }
            // n = 5, score = 300
            //   03c3                 | add                 eax, ebx
            //   8944242c             | mov                 dword ptr [esp + 0x2c], eax
            //   c6000e               | mov                 byte ptr [eax], 0xe
            //   8b44242c             | mov                 eax, dword ptr [esp + 0x2c]
            //   40                   | inc                 eax

        $sequence_5 = { 751a 8b4d70 8b556c 51 }
            // n = 4, score = 300
            //   751a                 | jne                 0x1c
            //   8b4d70               | mov                 ecx, dword ptr [ebp + 0x70]
            //   8b556c               | mov                 edx, dword ptr [ebp + 0x6c]
            //   51                   | push                ecx

        $sequence_6 = { 885500 8a542420 884501 884d02 885503 be01000000 a1???????? }
            // n = 7, score = 300
            //   885500               | mov                 byte ptr [ebp], dl
            //   8a542420             | mov                 dl, byte ptr [esp + 0x20]
            //   884501               | mov                 byte ptr [ebp + 1], al
            //   884d02               | mov                 byte ptr [ebp + 2], cl
            //   885503               | mov                 byte ptr [ebp + 3], dl
            //   be01000000           | mov                 esi, 1
            //   a1????????           |                     

        $sequence_7 = { 5f 5e 8bc3 5d 5b c3 8b54241c }
            // n = 7, score = 300
            //   5f                   | pop                 edi
            //   5e                   | pop                 esi
            //   8bc3                 | mov                 eax, ebx
            //   5d                   | pop                 ebp
            //   5b                   | pop                 ebx
            //   c3                   | ret                 
            //   8b54241c             | mov                 edx, dword ptr [esp + 0x1c]

        $sequence_8 = { 741e 8b442428 50 68???????? 6a02 e8???????? 83c40c }
            // n = 7, score = 300
            //   741e                 | je                  0x20
            //   8b442428             | mov                 eax, dword ptr [esp + 0x28]
            //   50                   | push                eax
            //   68????????           |                     
            //   6a02                 | push                2
            //   e8????????           |                     
            //   83c40c               | add                 esp, 0xc

        $sequence_9 = { 83ff10 7614 68???????? 6a5e 68???????? e8???????? 83c40c }
            // n = 7, score = 300
            //   83ff10               | cmp                 edi, 0x10
            //   7614                 | jbe                 0x16
            //   68????????           |                     
            //   6a5e                 | push                0x5e
            //   68????????           |                     
            //   e8????????           |                     
            //   83c40c               | add                 esp, 0xc

    condition:
        7 of them and filesize < 2482176
}
[TLP:WHITE] win_redpepper_w0   (20200101 | Adupib SSL Backdoor)
import "pe"

rule win_redpepper_w0 {
   meta:
      author = "Microsoft, modified by @r0ny_123"
      description = "Adupib SSL Backdoor"
      original_sample_sha1 = "d3ad0933e1b114b14c2b3a2c59d7f8a95ea0bcbd"
      unpacked_sample_sha1 = "a80051d5ae124fd9e5cc03e699dd91c2b373978b"
      malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.redpepper"
      malpedia_version = "20200101"
      malpedia_license = "CC BY-NC-SA 4.0"
      malpedia_sharing = "TLP:WHITE"
   strings:
      $str1 = "POLL_RATE"
      $str2 = "OP_TIME(end hour)"
      $str3 = "%d:TCP:*:Enabled"
      $s1 = "%s[PwFF_cfg%d]"
      $str4 = "Fake_GetDlgItemTextW: ***value***="

   condition:
      pe.exports("DllGetClassObject")
      and pe.exports("GetStartObjectEx") and (all of them or $s1)
}
Download all Yara Rules