SYMBOLCOMMON_NAMEaka. SYNONYMS
win.ryuk_stealer (Back to overview)

Ryuk Stealer

aka: Sidoh

Information Stealer that searches for sensitive documents and uploads its results to an FTP server. Skips files with known Ryuk extensions.

References
2021-08-31CrowdStrikeAlexander Hanel
@online{hanel:20210831:sidoh:8a5c018, author = {Alexander Hanel}, title = {{Sidoh: WIZARD SPIDER’s Mysterious Exfiltration Tool}}, date = {2021-08-31}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/sidoh-wizard-spiders-mysterious-exfiltration-tool/}, language = {English}, urldate = {2021-09-02} } Sidoh: WIZARD SPIDER’s Mysterious Exfiltration Tool
Ryuk Stealer
2021-08-11ANALYST1Jon DiMaggio
@techreport{dimaggio:20210811:nation:815fed9, author = {Jon DiMaggio}, title = {{Nation State Ransomware}}, date = {2021-08-11}, institution = {ANALYST1}, url = {https://analyst1.com/file-assets/Nationstate_ransomware_with_consecutive_endnotes.pdf}, language = {English}, urldate = {2021-08-17} } Nation State Ransomware
Ryuk Stealer
2019-09-11Twitter (@VK_intel)Vitali Kremez
@online{kremez:20190911:stealeruploader:0d4c48f, author = {Vitali Kremez}, title = {{Tweet on Stealer/Uploader}}, date = {2019-09-11}, organization = {Twitter (@VK_intel)}, url = {https://twitter.com/VK_Intel/status/1171782155581689858}, language = {English}, urldate = {2020-01-07} } Tweet on Stealer/Uploader
Ryuk Stealer
2019-09-11Bleeping ComputerLawrence Abrams
@online{abrams:20190911:ryuk:8a18715, author = {Lawrence Abrams}, title = {{Ryuk Related Malware Steals Confidential Military, Financial Files}}, date = {2019-09-11}, organization = {Bleeping Computer}, url = {https://www.bleepingcomputer.com/news/security/ryuk-related-malware-steals-confidential-military-financial-files/}, language = {English}, urldate = {2019-12-20} } Ryuk Related Malware Steals Confidential Military, Financial Files
Ryuk Stealer
Yara Rules
[TLP:WHITE] win_ryuk_stealer_auto (20211008 | Detects win.ryuk_stealer.)
rule win_ryuk_stealer_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2021-10-07"
        version = "1"
        description = "Detects win.ryuk_stealer."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.ryuk_stealer"
        malpedia_rule_date = "20211007"
        malpedia_hash = "e5b790e0f888f252d49063a1251ca60ec2832535"
        malpedia_version = "20211008"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 50 ff15???????? 8bf0 ff15???????? 85c0 7518 }
            // n = 6, score = 800
            //   50                   | push                eax
            //   ff15????????         |                     
            //   8bf0                 | mov                 esi, eax
            //   ff15????????         |                     
            //   85c0                 | test                eax, eax
            //   7518                 | jne                 0x1a

        $sequence_1 = { b910270000 f7f1 8bf2 e8???????? 8bc8 }
            // n = 5, score = 800
            //   b910270000           | mov                 ecx, 0x2710
            //   f7f1                 | div                 ecx
            //   8bf2                 | mov                 esi, edx
            //   e8????????           |                     
            //   8bc8                 | mov                 ecx, eax

        $sequence_2 = { 668945ec 8945ee 668945f2 8d45e0 50 }
            // n = 5, score = 800
            //   668945ec             | mov                 word ptr [ebp - 0x14], ax
            //   8945ee               | mov                 dword ptr [ebp - 0x12], eax
            //   668945f2             | mov                 word ptr [ebp - 0xe], ax
            //   8d45e0               | lea                 eax, dword ptr [ebp - 0x20]
            //   50                   | push                eax

        $sequence_3 = { 668945ec 8945ee 668945f2 8d45e0 }
            // n = 4, score = 800
            //   668945ec             | mov                 word ptr [ebp - 0x14], ax
            //   8945ee               | mov                 dword ptr [ebp - 0x12], eax
            //   668945f2             | mov                 word ptr [ebp - 0xe], ax
            //   8d45e0               | lea                 eax, dword ptr [ebp - 0x20]

        $sequence_4 = { 83f805 740a b9???????? e8???????? }
            // n = 4, score = 800
            //   83f805               | cmp                 eax, 5
            //   740a                 | je                  0xc
            //   b9????????           |                     
            //   e8????????           |                     

        $sequence_5 = { ff15???????? 83f805 740a b9???????? e8???????? }
            // n = 5, score = 800
            //   ff15????????         |                     
            //   83f805               | cmp                 eax, 5
            //   740a                 | je                  0xc
            //   b9????????           |                     
            //   e8????????           |                     

        $sequence_6 = { ff15???????? 50 ff15???????? 8bf0 ff15???????? 85c0 7518 }
            // n = 7, score = 800
            //   ff15????????         |                     
            //   50                   | push                eax
            //   ff15????????         |                     
            //   8bf0                 | mov                 esi, eax
            //   ff15????????         |                     
            //   85c0                 | test                eax, eax
            //   7518                 | jne                 0x1a

        $sequence_7 = { 85c0 7560 8d85b4fdffff 68???????? }
            // n = 4, score = 800
            //   85c0                 | test                eax, eax
            //   7560                 | jne                 0x62
            //   8d85b4fdffff         | lea                 eax, dword ptr [ebp - 0x24c]
            //   68????????           |                     

        $sequence_8 = { e8???????? 99 b9a0860100 f7f9 81c2f8240100 52 }
            // n = 6, score = 800
            //   e8????????           |                     
            //   99                   | cdq                 
            //   b9a0860100           | mov                 ecx, 0x186a0
            //   f7f9                 | idiv                ecx
            //   81c2f8240100         | add                 edx, 0x124f8
            //   52                   | push                edx

        $sequence_9 = { 50 0fb7447302 50 e8???????? }
            // n = 4, score = 800
            //   50                   | push                eax
            //   0fb7447302           | movzx               eax, word ptr [ebx + esi*2 + 2]
            //   50                   | push                eax
            //   e8????????           |                     

    condition:
        7 of them and filesize < 368640
}
Download all Yara Rules