SYMBOLCOMMON_NAMEaka. SYNONYMS
win.rombertik (Back to overview)

Rombertik

aka: CarbonGrabber

There is no description at this point.

References
2015-05-04Cisco TalosBen Baker, Alex Chiu
@online{baker:20150504:threat:726f1f2, author = {Ben Baker and Alex Chiu}, title = {{Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors}}, date = {2015-05-04}, organization = {Cisco Talos}, url = {http://blogs.cisco.com/security/talos/rombertik}, language = {English}, urldate = {2020-01-06} } Threat Spotlight: Rombertik – Gazing Past the Smoke, Mirrors, and Trapdoors
Rombertik
Yara Rules
[TLP:WHITE] win_rombertik_auto (20220516 | Detects win.rombertik.)
rule win_rombertik_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-05-16"
        version = "1"
        description = "Detects win.rombertik."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.rombertik"
        malpedia_rule_date = "20220513"
        malpedia_hash = "7f4b2229e6ae614d86d74917f6d5b41890e62a26"
        malpedia_version = "20220516"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 56 68???????? e9???????? 8d85c8fdffff }
            // n = 4, score = 200
            //   56                   | push                esi
            //   68????????           |                     
            //   e9????????           |                     
            //   8d85c8fdffff         | lea                 eax, [ebp - 0x238]

        $sequence_1 = { 7472 6a00 6880000000 6a03 6a00 }
            // n = 5, score = 200
            //   7472                 | je                  0x74
            //   6a00                 | push                0
            //   6880000000           | push                0x80
            //   6a03                 | push                3
            //   6a00                 | push                0

        $sequence_2 = { 83c410 eb2d 837d1400 7427 8b7d18 85ff }
            // n = 6, score = 200
            //   83c410               | add                 esp, 0x10
            //   eb2d                 | jmp                 0x2f
            //   837d1400             | cmp                 dword ptr [ebp + 0x14], 0
            //   7427                 | je                  0x29
            //   8b7d18               | mov                 edi, dword ptr [ebp + 0x18]
            //   85ff                 | test                edi, edi

        $sequence_3 = { 7537 6a02 68???????? 8d85e0feffff 50 }
            // n = 5, score = 200
            //   7537                 | jne                 0x39
            //   6a02                 | push                2
            //   68????????           |                     
            //   8d85e0feffff         | lea                 eax, [ebp - 0x120]
            //   50                   | push                eax

        $sequence_4 = { 85c0 743b 807dfee9 7435 56 }
            // n = 5, score = 200
            //   85c0                 | test                eax, eax
            //   743b                 | je                  0x3d
            //   807dfee9             | cmp                 byte ptr [ebp - 2], 0xe9
            //   7435                 | je                  0x37
            //   56                   | push                esi

        $sequence_5 = { 52 53 68ffff1f00 ff15???????? 8bf0 3bf3 0f84fd000000 }
            // n = 7, score = 200
            //   52                   | push                edx
            //   53                   | push                ebx
            //   68ffff1f00           | push                0x1fffff
            //   ff15????????         |                     
            //   8bf0                 | mov                 esi, eax
            //   3bf3                 | cmp                 esi, ebx
            //   0f84fd000000         | je                  0x103

        $sequence_6 = { 8b5d0c 85db 0f84cb000000 837d1400 0f84c1000000 817d18a00f0000 0f87b4000000 }
            // n = 7, score = 200
            //   8b5d0c               | mov                 ebx, dword ptr [ebp + 0xc]
            //   85db                 | test                ebx, ebx
            //   0f84cb000000         | je                  0xd1
            //   837d1400             | cmp                 dword ptr [ebp + 0x14], 0
            //   0f84c1000000         | je                  0xc7
            //   817d18a00f0000       | cmp                 dword ptr [ebp + 0x18], 0xfa0
            //   0f87b4000000         | ja                  0xba

        $sequence_7 = { 0f841a010000 8b95d0feffff 52 53 68ffff1f00 ff15???????? }
            // n = 6, score = 200
            //   0f841a010000         | je                  0x120
            //   8b95d0feffff         | mov                 edx, dword ptr [ebp - 0x130]
            //   52                   | push                edx
            //   53                   | push                ebx
            //   68ffff1f00           | push                0x1fffff
            //   ff15????????         |                     

        $sequence_8 = { 8b4dfc f3a4 61 8b75f0 }
            // n = 4, score = 200
            //   8b4dfc               | mov                 ecx, dword ptr [ebp - 4]
            //   f3a4                 | rep movsb           byte ptr es:[edi], byte ptr [esi]
            //   61                   | popal               
            //   8b75f0               | mov                 esi, dword ptr [ebp - 0x10]

        $sequence_9 = { 8b75fc 56 6a00 ff15???????? 50 ff15???????? 5e }
            // n = 7, score = 200
            //   8b75fc               | mov                 esi, dword ptr [ebp - 4]
            //   56                   | push                esi
            //   6a00                 | push                0
            //   ff15????????         |                     
            //   50                   | push                eax
            //   ff15????????         |                     
            //   5e                   | pop                 esi

    condition:
        7 of them and filesize < 73728
}
[TLP:WHITE] win_rombertik_w0   (20170521 | Detects CarbonGrabber alias Rombertik - file Copy#064046.scr)
rule win_rombertik_w0 {
	meta:
		author = "Florian Roth"
		description = "Detects CarbonGrabber alias Rombertik - file Copy#064046.scr"
		reference = "http://blogs.cisco.com/security/talos/rombertik"
		date = "2015-05-05"
		hash = "2f9b26b90311e62662c5946a1ac600d2996d3758"
		hash = "aeb94064af2a6107a14fd32f39cb502e704cd0ab"
		hash = "c2005c8d1a79da5e02e6a15d00151018658c264c" 
		hash = "98223d4ec272d3a631498b621618d875dd32161d" 	
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.rombertik"
        malpedia_version = "20170521"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
        
	strings:
		$x1 = "ZwGetWriteWatch" fullword ascii
		$x2 = "OutputDebugStringA" fullword ascii
		$x3 = "malwar" fullword ascii
		$x4 = "sampl" fullword ascii
		$x5 = "viru" fullword ascii
		$x6 = "sandb" fullword ascii
		
	condition:
		uint16(0) == 0x5a4d and filesize < 5MB and all of them
}
[TLP:WHITE] win_rombertik_w1   (20170521 | Detects CarbonGrabber alias Rombertik panel install script - file install.php)
rule win_rombertik_w1 {
	meta:
		description = "Detects CarbonGrabber alias Rombertik panel install script - file install.php"
		author = "Florian Roth"
		reference = "http://blogs.cisco.com/security/talos/rombertik"
		date = "2015-05-05"
		hash = "cd6c152dd1e0689e0bede30a8bd07fef465fbcfa"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.rombertik"
        malpedia_version = "20170521"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
        
	strings:
		$s0 = "$insert = \"INSERT INTO `logs` (`id`, `ip`, `name`, `host`, `post`, `time`, `bro" ascii
		$s3 = "`post` text NOT NULL," fullword ascii
		$s4 = "`host` text NOT NULL," fullword ascii
		$s5 = ") ENGINE=InnoDB  DEFAULT CHARSET=latin1 AUTO_INCREMENT=5 ;\" ;" fullword ascii
		$s6 = "$db->exec($columns); //or die(print_r($db->errorInfo(), true));;" fullword ascii
		$s9 = "$db->exec($insert);" fullword ascii
		$s10 = "`browser` text NOT NULL," fullword ascii
		$s13 = "`ip` text NOT NULL," fullword ascii
		
	condition:
		filesize < 3KB and all of them
}
[TLP:WHITE] win_rombertik_w2   (20170521 | Detects CarbonGrabber alias Rombertik Panel - file index.php)
rule win_rombertik_w2 {
	meta:
		description = "Detects CarbonGrabber alias Rombertik Panel - file index.php"
		author = "Florian Roth"
		reference = "http://blogs.cisco.com/security/talos/rombertik"
		date = "2015-05-05"
		hash = "e6e9e4fc3772ff33bbeeda51f217e9149db60082"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.rombertik"
        malpedia_version = "20170521"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
        
	strings:
		$s0 = "echo '<meta http-equiv=\"refresh\" content=\"0;url=index.php?a=login\">';" fullword ascii
		$s1 = "echo '<meta http-equiv=\"refresh\" content=\"2;url='.$website.'/index.php?a=login" ascii
		$s2 = "header(\"location: $website/index.php?a=login\");" fullword ascii
		$s3 = "$insertLogSQL -> execute(array(':id' => NULL, ':ip' => $ip, ':name' => $name, ':" ascii
		$s16 = "if($_POST['username'] == $username && $_POST['password'] == $password){" fullword ascii
		$s17 = "$SQL = $db -> prepare(\"TRUNCATE TABLE `logs`\");" fullword ascii
		
	condition:
		filesize < 46KB and all of them
}
[TLP:WHITE] win_rombertik_w3   (20170521 | Detects CarbonGrabber alias Rombertik Builder - file Builder.exe)
rule win_rombertik_w3 {
	meta:
		description = "Detects CarbonGrabber alias Rombertik Builder - file Builder.exe"
		author = "Florian Roth"
		reference = "http://blogs.cisco.com/security/talos/rombertik"
		date = "2015-05-05"
		hash = "b50ecc0ba3d6ec19b53efe505d14276e9e71285f"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.rombertik"
        malpedia_version = "20170521"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
        
	strings:
		$s0 = "c:\\users\\iden\\documents\\visual studio 2010\\Projects\\FormGrabberBuilderC++" ascii
		$s1 = "Host(www.panel.com): " fullword ascii
		$s2 = "Path(/form/index.php?a=insert): " fullword ascii
		$s3 = "FileName: " fullword ascii
		$s4 = "~Rich8" fullword ascii
		
	condition:
		uint16(0) == 0x5a4d and filesize < 35KB and all of them
}
[TLP:WHITE] win_rombertik_w4   (20170521 | Detects CarbonGrabber alias Rombertik Builder Server - file Server.exe)
rule win_rombertik_w4 {
	meta:
		description = "Detects CarbonGrabber alias Rombertik Builder Server - file Server.exe"
		author = "Florian Roth"
		reference = "http://blogs.cisco.com/security/talos/rombertik"
		date = "2015-05-05"
		hash = "895fab8d55882eac51d4b27a188aa67205ff0ae5"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.rombertik"
        malpedia_version = "20170521"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"
        
	strings:
		$s0 = "C:\\WINDOWS\\system32\\svchost.exe" fullword ascii
		$s3 = "Software\\Microsoft\\Windows\\Currentversion\\RunOnce" fullword ascii
		$s4 = "chrome.exe" fullword ascii
		$s5 = "firefox.exe" fullword ascii
		$s6 = "chrome.dll" fullword ascii
		$s7 = "@KERNEL32.DLL" fullword wide
		$s8 = "Mozilla/5.0 (Windows NT 6.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome" ascii
		$s10 = "&post=" fullword ascii
		$s11 = "&host=" fullword ascii
		$s12 = "Ws2_32.dll" fullword ascii
		$s16 = "&browser=" fullword ascii
		
	condition:
		uint16(0) == 0x5a4d and filesize < 250KB and 8 of them
}
Download all Yara Rules