There is no description at this point.
rule win_sage_ransom_auto { meta: author = "Felix Bilstein - yara-signator at cocacoding dot com" date = "2022-04-08" version = "1" description = "Detects win.sage_ransom." info = "autogenerated rule brought to you by yara-signator" tool = "yara-signator v0.6.0" signator_config = "callsandjumps;datarefs;binvalue" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.sage_ransom" malpedia_rule_date = "20220405" malpedia_hash = "ecd38294bd47d5589be5cd5490dc8bb4804afc2a" malpedia_version = "20220411" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" /* DISCLAIMER * The strings used in this rule have been automatically selected from the * disassembly of memory dumps and unpacked files, using YARA-Signator. * The code and documentation is published here: * https://github.com/fxb-cocacoding/yara-signator * As Malpedia is used as data source, please note that for a given * number of families, only single samples are documented. * This likely impacts the degree of generalization these rules will offer. * Take the described generation method also into consideration when you * apply the rules in your use cases and assign them confidence levels. */ strings: $sequence_0 = { 66833864 755b 6683780200 7554 } // n = 4, score = 300 // 66833864 | cmp word ptr [eax], 0x64 // 755b | jne 0x5d // 6683780200 | cmp word ptr [eax + 2], 0 // 7554 | jne 0x56 $sequence_1 = { e8???????? a1???????? 6a08 83c004 50 } // n = 5, score = 300 // e8???????? | // a1???????? | // 6a08 | push 8 // 83c004 | add eax, 4 // 50 | push eax $sequence_2 = { 803c302b 7504 c604302d 803c302f 7504 c604305f } // n = 6, score = 300 // 803c302b | cmp byte ptr [eax + esi], 0x2b // 7504 | jne 6 // c604302d | mov byte ptr [eax + esi], 0x2d // 803c302f | cmp byte ptr [eax + esi], 0x2f // 7504 | jne 6 // c604305f | mov byte ptr [eax + esi], 0x5f $sequence_3 = { 6a01 e8???????? 8b4c2448 8b542444 6a00 51 } // n = 6, score = 300 // 6a01 | push 1 // e8???????? | // 8b4c2448 | mov ecx, dword ptr [esp + 0x48] // 8b542444 | mov edx, dword ptr [esp + 0x44] // 6a00 | push 0 // 51 | push ecx $sequence_4 = { 53 8bfb ff15???????? 8b35???????? 68???????? 57 8d5c4302 } // n = 7, score = 300 // 53 | push ebx // 8bfb | mov edi, ebx // ff15???????? | // 8b35???????? | // 68???????? | // 57 | push edi // 8d5c4302 | lea ebx, dword ptr [ebx + eax*2 + 2] $sequence_5 = { 50 e8???????? 8b0d???????? 6a08 83c104 51 } // n = 6, score = 300 // 50 | push eax // e8???????? | // 8b0d???????? | // 6a08 | push 8 // 83c104 | add ecx, 4 // 51 | push ecx $sequence_6 = { 742a 85ff 7409 57 e8???????? 83c404 } // n = 6, score = 300 // 742a | je 0x2c // 85ff | test edi, edi // 7409 | je 0xb // 57 | push edi // e8???????? | // 83c404 | add esp, 4 $sequence_7 = { 50 68???????? e8???????? 83c414 8d4c2414 51 8d542428 } // n = 7, score = 300 // 50 | push eax // 68???????? | // e8???????? | // 83c414 | add esp, 0x14 // 8d4c2414 | lea ecx, dword ptr [esp + 0x14] // 51 | push ecx // 8d542428 | lea edx, dword ptr [esp + 0x28] $sequence_8 = { 014110 8b4314 014114 8b4318 } // n = 4, score = 200 // 014110 | add dword ptr [ecx + 0x10], eax // 8b4314 | mov eax, dword ptr [ebx + 0x14] // 014114 | add dword ptr [ecx + 0x14], eax // 8b4318 | mov eax, dword ptr [ebx + 0x18] $sequence_9 = { 0101 8b4304 014104 8b4308 014108 } // n = 5, score = 200 // 0101 | add dword ptr [ecx], eax // 8b4304 | mov eax, dword ptr [ebx + 4] // 014104 | add dword ptr [ecx + 4], eax // 8b4308 | mov eax, dword ptr [ebx + 8] // 014108 | add dword ptr [ecx + 8], eax $sequence_10 = { 01410c 8b4310 014110 8b4314 } // n = 4, score = 200 // 01410c | add dword ptr [ecx + 0xc], eax // 8b4310 | mov eax, dword ptr [ebx + 0x10] // 014110 | add dword ptr [ecx + 0x10], eax // 8b4314 | mov eax, dword ptr [ebx + 0x14] $sequence_11 = { 013c13 83c102 46 ebd3 } // n = 4, score = 200 // 013c13 | add dword ptr [ebx + edx], edi // 83c102 | add ecx, 2 // 46 | inc esi // ebd3 | jmp 0xffffffd5 $sequence_12 = { 891424 ff90bc020000 8b8d6cffffff 52 83c008 8944240c 895c2408 } // n = 7, score = 200 // 891424 | mov dword ptr [esp], edx // ff90bc020000 | call dword ptr [eax + 0x2bc] // 8b8d6cffffff | mov ecx, dword ptr [ebp - 0x94] // 52 | push edx // 83c008 | add eax, 8 // 8944240c | mov dword ptr [esp + 0xc], eax // 895c2408 | mov dword ptr [esp + 8], ebx $sequence_13 = { 014114 8b4318 014118 8b431c } // n = 4, score = 200 // 014114 | add dword ptr [ecx + 0x14], eax // 8b4318 | mov eax, dword ptr [ebx + 0x18] // 014118 | add dword ptr [ecx + 0x18], eax // 8b431c | mov eax, dword ptr [ebx + 0x1c] $sequence_14 = { 0119 117104 83c110 83c210 } // n = 4, score = 200 // 0119 | add dword ptr [ecx], ebx // 117104 | adc dword ptr [ecx + 4], esi // 83c110 | add ecx, 0x10 // 83c210 | add edx, 0x10 $sequence_15 = { 014108 8b430c 01410c 8b4310 } // n = 4, score = 200 // 014108 | add dword ptr [ecx + 8], eax // 8b430c | mov eax, dword ptr [ebx + 0xc] // 01410c | add dword ptr [ecx + 0xc], eax // 8b4310 | mov eax, dword ptr [ebx + 0x10] condition: 7 of them and filesize < 335872 }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below.
Please propose all changes regarding references on the Malpedia library page
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY