SYMBOLCOMMON_NAMEaka. SYNONYMS
win.rockloader (Back to overview)

Rockloader


There is no description at this point.

References
2021-09-03Trend MicroMohamad Mokbel
@techreport{mokbel:20210903:state:df86499, author = {Mohamad Mokbel}, title = {{The State of SSL/TLS Certificate Usage in Malware C&C Communications}}, date = {2021-09-03}, institution = {Trend Micro}, url = {https://www.trendmicro.com/content/dam/trendmicro/global/en/research/21/i/ssl-tls-technical-brief/ssl-tls-technical-brief.pdf}, language = {English}, urldate = {2021-09-19} } The State of SSL/TLS Certificate Usage in Malware C&C Communications
AdWind ostap AsyncRAT BazarBackdoor BitRAT Buer Chthonic CloudEyE Cobalt Strike DCRat Dridex FindPOS GootKit Gozi IcedID ISFB Nanocore RAT Orcus RAT PandaBanker Qadars QakBot Quasar RAT Rockloader ServHelper Shifu SManager TorrentLocker TrickBot Vawtrak Zeus Zloader
2020-05-21Intel 471Intel 471
@online{471:20200521:brief:048d164, author = {Intel 471}, title = {{A brief history of TA505}}, date = {2020-05-21}, organization = {Intel 471}, url = {https://intel471.com/blog/a-brief-history-of-ta505}, language = {English}, urldate = {2022-02-14} } A brief history of TA505
AndroMut Bart Dridex FlawedAmmyy FlawedGrace Gandcrab Get2 GlobeImposter Jaff Kegotip Locky Necurs Philadephia Ransom Pony QuantLoader Rockloader SDBbot ServHelper Shifu Snatch TrickBot
2016-04-06ProofpointChris Wakelin
@online{wakelin:20160406:locky:c653996, author = {Chris Wakelin}, title = {{Locky Ransomware Is Becoming More Sophisticated - Cybercriminals Continue Email Campaign Innovation}}, date = {2016-04-06}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/threat-insight/post/Locky-Ransomware-Cybercriminals-Introduce-New-RockLoader-Malware}, language = {English}, urldate = {2019-12-20} } Locky Ransomware Is Becoming More Sophisticated - Cybercriminals Continue Email Campaign Innovation
Rockloader
Yara Rules
[TLP:WHITE] win_rockloader_auto (20230125 | Detects win.rockloader.)
rule win_rockloader_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-01-25"
        version = "1"
        description = "Detects win.rockloader."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.rockloader"
        malpedia_rule_date = "20230124"
        malpedia_hash = "2ee0eebba83dce3d019a90519f2f972c0fcf9686"
        malpedia_version = "20230125"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 894608 8b4508 e8???????? 85c0 }
            // n = 4, score = 300
            //   894608               | mov                 dword ptr [esi + 8], eax
            //   8b4508               | mov                 eax, dword ptr [ebp + 8]
            //   e8????????           |                     
            //   85c0                 | test                eax, eax

        $sequence_1 = { 8d46ff 394514 7404 c6072c 47 837d1000 7404 }
            // n = 7, score = 300
            //   8d46ff               | lea                 eax, [esi - 1]
            //   394514               | cmp                 dword ptr [ebp + 0x14], eax
            //   7404                 | je                  6
            //   c6072c               | mov                 byte ptr [edi], 0x2c
            //   47                   | inc                 edi
            //   837d1000             | cmp                 dword ptr [ebp + 0x10], 0
            //   7404                 | je                  6

        $sequence_2 = { 0f8796000000 b9ff030000 23d9 c1e30a 23c1 0bd8 81c300000100 }
            // n = 7, score = 300
            //   0f8796000000         | ja                  0x9c
            //   b9ff030000           | mov                 ecx, 0x3ff
            //   23d9                 | and                 ebx, ecx
            //   c1e30a               | shl                 ebx, 0xa
            //   23c1                 | and                 eax, ecx
            //   0bd8                 | or                  ebx, eax
            //   81c300000100         | add                 ebx, 0x10000

        $sequence_3 = { 8937 897e04 8d4301 8bfe }
            // n = 4, score = 300
            //   8937                 | mov                 dword ptr [edi], esi
            //   897e04               | mov                 dword ptr [esi + 4], edi
            //   8d4301               | lea                 eax, [ebx + 1]
            //   8bfe                 | mov                 edi, esi

        $sequence_4 = { 7407 50 ff15???????? ff750c e8???????? }
            // n = 5, score = 300
            //   7407                 | je                  9
            //   50                   | push                eax
            //   ff15????????         |                     
            //   ff750c               | push                dword ptr [ebp + 0xc]
            //   e8????????           |                     

        $sequence_5 = { 33c9 2bc2 394d0c 0f95c1 03c8 }
            // n = 5, score = 300
            //   33c9                 | xor                 ecx, ecx
            //   2bc2                 | sub                 eax, edx
            //   394d0c               | cmp                 dword ptr [ebp + 0xc], ecx
            //   0f95c1               | setne               cl
            //   03c8                 | add                 ecx, eax

        $sequence_6 = { 56 ff15???????? 8bf3 85db 75b5 5f }
            // n = 6, score = 300
            //   56                   | push                esi
            //   ff15????????         |                     
            //   8bf3                 | mov                 esi, ebx
            //   85db                 | test                ebx, ebx
            //   75b5                 | jne                 0xffffffb7
            //   5f                   | pop                 edi

        $sequence_7 = { 8d7301 eb71 8a07 3c1f }
            // n = 4, score = 300
            //   8d7301               | lea                 esi, [ebx + 1]
            //   eb71                 | jmp                 0x73
            //   8a07                 | mov                 al, byte ptr [edi]
            //   3c1f                 | cmp                 al, 0x1f

        $sequence_8 = { 83ec0c 8d5001 8a08 40 }
            // n = 4, score = 300
            //   83ec0c               | sub                 esp, 0xc
            //   8d5001               | lea                 edx, [eax + 1]
            //   8a08                 | mov                 cl, byte ptr [eax]
            //   40                   | inc                 eax

        $sequence_9 = { c9 c20800 85c0 740e }
            // n = 4, score = 300
            //   c9                   | leave               
            //   c20800               | ret                 8
            //   85c0                 | test                eax, eax
            //   740e                 | je                  0x10

    condition:
        7 of them and filesize < 98304
}
Download all Yara Rules