SYMBOLCOMMON_NAMEaka. SYNONYMS
win.rombertik (Back to overview)

Rombertik

aka: CarbonGrabber
VTCollection    

There is no description at this point.

References
2015-05-04Cisco TalosAlex Chiu, Ben Baker
Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors
Rombertik
Yara Rules
[TLP:WHITE] win_rombertik_auto (20230808 | Detects win.rombertik.)
rule win_rombertik_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-12-06"
        version = "1"
        description = "Detects win.rombertik."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.rombertik"
        malpedia_rule_date = "20231130"
        malpedia_hash = "fc8a0e9f343f6d6ded9e7df1a64dac0cc68d7351"
        malpedia_version = "20230808"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 8945f4 3bc1 0f8271ffffff 5f 5e }
            // n = 5, score = 200
            //   8945f4               | mov                 dword ptr [ebp - 0xc], eax
            //   3bc1                 | cmp                 eax, ecx
            //   0f8271ffffff         | jb                  0xffffff77
            //   5f                   | pop                 edi
            //   5e                   | pop                 esi

        $sequence_1 = { 8bff 8b4104 85c0 7446 83c0f8 33ff }
            // n = 6, score = 200
            //   8bff                 | mov                 edi, edi
            //   8b4104               | mov                 eax, dword ptr [ecx + 4]
            //   85c0                 | test                eax, eax
            //   7446                 | je                  0x48
            //   83c0f8               | add                 eax, -8
            //   33ff                 | xor                 edi, edi

        $sequence_2 = { 8bcf e8???????? 50 8d8dfcfeffff }
            // n = 4, score = 200
            //   8bcf                 | mov                 ecx, edi
            //   e8????????           |                     
            //   50                   | push                eax
            //   8d8dfcfeffff         | lea                 ecx, [ebp - 0x104]

        $sequence_3 = { 47 41 3bfb 72be 8b5df0 }
            // n = 5, score = 200
            //   47                   | inc                 edi
            //   41                   | inc                 ecx
            //   3bfb                 | cmp                 edi, ebx
            //   72be                 | jb                  0xffffffc0
            //   8b5df0               | mov                 ebx, dword ptr [ebp - 0x10]

        $sequence_4 = { 50 ff15???????? 8bf8 85ff 0f8488000000 }
            // n = 5, score = 200
            //   50                   | push                eax
            //   ff15????????         |                     
            //   8bf8                 | mov                 edi, eax
            //   85ff                 | test                edi, edi
            //   0f8488000000         | je                  0x8e

        $sequence_5 = { 33db 57 895df8 ff15???????? 85c0 }
            // n = 5, score = 200
            //   33db                 | xor                 ebx, ebx
            //   57                   | push                edi
            //   895df8               | mov                 dword ptr [ebp - 8], ebx
            //   ff15????????         |                     
            //   85c0                 | test                eax, eax

        $sequence_6 = { 8b5d0c 85db 0f84cb000000 837d1400 0f84c1000000 817d18a00f0000 0f87b4000000 }
            // n = 7, score = 200
            //   8b5d0c               | mov                 ebx, dword ptr [ebp + 0xc]
            //   85db                 | test                ebx, ebx
            //   0f84cb000000         | je                  0xd1
            //   837d1400             | cmp                 dword ptr [ebp + 0x14], 0
            //   0f84c1000000         | je                  0xc7
            //   817d18a00f0000       | cmp                 dword ptr [ebp + 0x18], 0xfa0
            //   0f87b4000000         | ja                  0xba

        $sequence_7 = { 50 8bc2 50 8d8decfeffff 51 ffd6 }
            // n = 6, score = 200
            //   50                   | push                eax
            //   8bc2                 | mov                 eax, edx
            //   50                   | push                eax
            //   8d8decfeffff         | lea                 ecx, [ebp - 0x114]
            //   51                   | push                ecx
            //   ffd6                 | call                esi

        $sequence_8 = { 895dfc 85db 0f84d8000000 85ff }
            // n = 4, score = 200
            //   895dfc               | mov                 dword ptr [ebp - 4], ebx
            //   85db                 | test                ebx, ebx
            //   0f84d8000000         | je                  0xde
            //   85ff                 | test                edi, edi

        $sequence_9 = { 6a03 6a00 6a02 68000000c0 68???????? ff15???????? 8906 }
            // n = 7, score = 200
            //   6a03                 | push                3
            //   6a00                 | push                0
            //   6a02                 | push                2
            //   68000000c0           | push                0xc0000000
            //   68????????           |                     
            //   ff15????????         |                     
            //   8906                 | mov                 dword ptr [esi], eax

    condition:
        7 of them and filesize < 73728
}
[TLP:WHITE] win_rombertik_w0   (20170521 | Detects CarbonGrabber alias Rombertik - file Copy#064046.scr)
rule win_rombertik_w0 {
	meta:
		author = "Florian Roth"
		description = "Detects CarbonGrabber alias Rombertik - file Copy#064046.scr"
		reference = "http://blogs.cisco.com/security/talos/rombertik"
		date = "2015-05-05"
		hash = "2f9b26b90311e62662c5946a1ac600d2996d3758"
		hash = "aeb94064af2a6107a14fd32f39cb502e704cd0ab"
		hash = "c2005c8d1a79da5e02e6a15d00151018658c264c" 
		hash = "98223d4ec272d3a631498b621618d875dd32161d" 	
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.rombertik"
        malpedia_version = "20170521"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
        
	strings:
		$x1 = "ZwGetWriteWatch" fullword ascii
		$x2 = "OutputDebugStringA" fullword ascii
		$x3 = "malwar" fullword ascii
		$x4 = "sampl" fullword ascii
		$x5 = "viru" fullword ascii
		$x6 = "sandb" fullword ascii
		
	condition:
		uint16(0) == 0x5a4d and filesize < 5MB and all of them
}
[TLP:WHITE] win_rombertik_w1   (20170521 | Detects CarbonGrabber alias Rombertik panel install script - file install.php)
rule win_rombertik_w1 {
	meta:
		description = "Detects CarbonGrabber alias Rombertik panel install script - file install.php"
		author = "Florian Roth"
		reference = "http://blogs.cisco.com/security/talos/rombertik"
		date = "2015-05-05"
		hash = "cd6c152dd1e0689e0bede30a8bd07fef465fbcfa"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.rombertik"
        malpedia_version = "20170521"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
        
	strings:
		$s0 = "$insert = \"INSERT INTO `logs` (`id`, `ip`, `name`, `host`, `post`, `time`, `bro" ascii
		$s3 = "`post` text NOT NULL," fullword ascii
		$s4 = "`host` text NOT NULL," fullword ascii
		$s5 = ") ENGINE=InnoDB  DEFAULT CHARSET=latin1 AUTO_INCREMENT=5 ;\" ;" fullword ascii
		$s6 = "$db->exec($columns); //or die(print_r($db->errorInfo(), true));;" fullword ascii
		$s9 = "$db->exec($insert);" fullword ascii
		$s10 = "`browser` text NOT NULL," fullword ascii
		$s13 = "`ip` text NOT NULL," fullword ascii
		
	condition:
		filesize < 3KB and all of them
}
[TLP:WHITE] win_rombertik_w2   (20170521 | Detects CarbonGrabber alias Rombertik Panel - file index.php)
rule win_rombertik_w2 {
	meta:
		description = "Detects CarbonGrabber alias Rombertik Panel - file index.php"
		author = "Florian Roth"
		reference = "http://blogs.cisco.com/security/talos/rombertik"
		date = "2015-05-05"
		hash = "e6e9e4fc3772ff33bbeeda51f217e9149db60082"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.rombertik"
        malpedia_version = "20170521"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
        
	strings:
		$s0 = "echo '<meta http-equiv=\"refresh\" content=\"0;url=index.php?a=login\">';" fullword ascii
		$s1 = "echo '<meta http-equiv=\"refresh\" content=\"2;url='.$website.'/index.php?a=login" ascii
		$s2 = "header(\"location: $website/index.php?a=login\");" fullword ascii
		$s3 = "$insertLogSQL -> execute(array(':id' => NULL, ':ip' => $ip, ':name' => $name, ':" ascii
		$s16 = "if($_POST['username'] == $username && $_POST['password'] == $password){" fullword ascii
		$s17 = "$SQL = $db -> prepare(\"TRUNCATE TABLE `logs`\");" fullword ascii
		
	condition:
		filesize < 46KB and all of them
}
[TLP:WHITE] win_rombertik_w3   (20170521 | Detects CarbonGrabber alias Rombertik Builder - file Builder.exe)
rule win_rombertik_w3 {
	meta:
		description = "Detects CarbonGrabber alias Rombertik Builder - file Builder.exe"
		author = "Florian Roth"
		reference = "http://blogs.cisco.com/security/talos/rombertik"
		date = "2015-05-05"
		hash = "b50ecc0ba3d6ec19b53efe505d14276e9e71285f"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.rombertik"
        malpedia_version = "20170521"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
        
	strings:
		$s0 = "c:\\users\\iden\\documents\\visual studio 2010\\Projects\\FormGrabberBuilderC++" ascii
		$s1 = "Host(www.panel.com): " fullword ascii
		$s2 = "Path(/form/index.php?a=insert): " fullword ascii
		$s3 = "FileName: " fullword ascii
		$s4 = "~Rich8" fullword ascii
		
	condition:
		uint16(0) == 0x5a4d and filesize < 35KB and all of them
}
[TLP:WHITE] win_rombertik_w4   (20170521 | Detects CarbonGrabber alias Rombertik Builder Server - file Server.exe)
rule win_rombertik_w4 {
	meta:
		description = "Detects CarbonGrabber alias Rombertik Builder Server - file Server.exe"
		author = "Florian Roth"
		reference = "http://blogs.cisco.com/security/talos/rombertik"
		date = "2015-05-05"
		hash = "895fab8d55882eac51d4b27a188aa67205ff0ae5"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.rombertik"
        malpedia_version = "20170521"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
        
	strings:
		$s0 = "C:\\WINDOWS\\system32\\svchost.exe" fullword ascii
		$s3 = "Software\\Microsoft\\Windows\\Currentversion\\RunOnce" fullword ascii
		$s4 = "chrome.exe" fullword ascii
		$s5 = "firefox.exe" fullword ascii
		$s6 = "chrome.dll" fullword ascii
		$s7 = "@KERNEL32.DLL" fullword wide
		$s8 = "Mozilla/5.0 (Windows NT 6.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome" ascii
		$s10 = "&post=" fullword ascii
		$s11 = "&host=" fullword ascii
		$s12 = "Ws2_32.dll" fullword ascii
		$s16 = "&browser=" fullword ascii
		
	condition:
		uint16(0) == 0x5a4d and filesize < 250KB and 8 of them
}
Download all Yara Rules