SYMBOLCOMMON_NAMEaka. SYNONYMS
win.sage_ransom (Back to overview)

SAGE

aka: Saga

There is no description at this point.

References
2017-10-13Malware Traffic AnalysisBrad Duncan
@online{duncan:20171013:blank:71e7858, author = {Brad Duncan}, title = {{Blank Slate Malspam Stops Pushing Locky, Starts Pushing Sage 2.2 Randsomware}}, date = {2017-10-13}, organization = {Malware Traffic Analysis}, url = {http://malware-traffic-analysis.net/2017/10/13/index.html}, language = {English}, urldate = {2020-01-13} } Blank Slate Malspam Stops Pushing Locky, Starts Pushing Sage 2.2 Randsomware
SAGE
2017-03-29MalwarebytesMalwarebytes Labs
@online{labs:20170329:explained:dc19964, author = {Malwarebytes Labs}, title = {{Explained: Sage ransomware}}, date = {2017-03-29}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2017/03/explained-sage-ransomware/}, language = {English}, urldate = {2019-12-20} } Explained: Sage ransomware
SAGE
2017-02-14CERT.PLJarosław Jedynak
@online{jedynak:20170214:sage:c9187b1, author = {Jarosław Jedynak}, title = {{Sage 2.0 analysis}}, date = {2017-02-14}, organization = {CERT.PL}, url = {https://www.cert.pl/en/news/single/sage-2-0-analysis/}, language = {English}, urldate = {2020-01-13} } Sage 2.0 analysis
SAGE
2017-01-30GovCERT.chGovCERT.ch
@online{govcertch:20170130:sage:022d593, author = {GovCERT.ch}, title = {{Sage 2.0 comes with IP Generation Algorithm (IPGA)}}, date = {2017-01-30}, organization = {GovCERT.ch}, url = {https://www.govcert.admin.ch/blog/27/saga-2.0-comes-with-ip-generation-algorithm-ipga}, language = {English}, urldate = {2019-11-29} } Sage 2.0 comes with IP Generation Algorithm (IPGA)
SAGE
2017-01-21SANS ISC InfoSec ForumsBrad Duncan
@online{duncan:20170121:sage:cf422da, author = {Brad Duncan}, title = {{Sage 2.0 Ransomware}}, date = {2017-01-21}, organization = {SANS ISC InfoSec Forums}, url = {https://isc.sans.edu/forums/diary/Sage+20+Ransomware/21959/}, language = {English}, urldate = {2019-07-11} } Sage 2.0 Ransomware
SAGE
Yara Rules
[TLP:WHITE] win_sage_ransom_auto (20220411 | Detects win.sage_ransom.)
rule win_sage_ransom_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-04-08"
        version = "1"
        description = "Detects win.sage_ransom."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.sage_ransom"
        malpedia_rule_date = "20220405"
        malpedia_hash = "ecd38294bd47d5589be5cd5490dc8bb4804afc2a"
        malpedia_version = "20220411"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 66833864 755b 6683780200 7554 }
            // n = 4, score = 300
            //   66833864             | cmp                 word ptr [eax], 0x64
            //   755b                 | jne                 0x5d
            //   6683780200           | cmp                 word ptr [eax + 2], 0
            //   7554                 | jne                 0x56

        $sequence_1 = { e8???????? a1???????? 6a08 83c004 50 }
            // n = 5, score = 300
            //   e8????????           |                     
            //   a1????????           |                     
            //   6a08                 | push                8
            //   83c004               | add                 eax, 4
            //   50                   | push                eax

        $sequence_2 = { 803c302b 7504 c604302d 803c302f 7504 c604305f }
            // n = 6, score = 300
            //   803c302b             | cmp                 byte ptr [eax + esi], 0x2b
            //   7504                 | jne                 6
            //   c604302d             | mov                 byte ptr [eax + esi], 0x2d
            //   803c302f             | cmp                 byte ptr [eax + esi], 0x2f
            //   7504                 | jne                 6
            //   c604305f             | mov                 byte ptr [eax + esi], 0x5f

        $sequence_3 = { 6a01 e8???????? 8b4c2448 8b542444 6a00 51 }
            // n = 6, score = 300
            //   6a01                 | push                1
            //   e8????????           |                     
            //   8b4c2448             | mov                 ecx, dword ptr [esp + 0x48]
            //   8b542444             | mov                 edx, dword ptr [esp + 0x44]
            //   6a00                 | push                0
            //   51                   | push                ecx

        $sequence_4 = { 53 8bfb ff15???????? 8b35???????? 68???????? 57 8d5c4302 }
            // n = 7, score = 300
            //   53                   | push                ebx
            //   8bfb                 | mov                 edi, ebx
            //   ff15????????         |                     
            //   8b35????????         |                     
            //   68????????           |                     
            //   57                   | push                edi
            //   8d5c4302             | lea                 ebx, dword ptr [ebx + eax*2 + 2]

        $sequence_5 = { 50 e8???????? 8b0d???????? 6a08 83c104 51 }
            // n = 6, score = 300
            //   50                   | push                eax
            //   e8????????           |                     
            //   8b0d????????         |                     
            //   6a08                 | push                8
            //   83c104               | add                 ecx, 4
            //   51                   | push                ecx

        $sequence_6 = { 742a 85ff 7409 57 e8???????? 83c404 }
            // n = 6, score = 300
            //   742a                 | je                  0x2c
            //   85ff                 | test                edi, edi
            //   7409                 | je                  0xb
            //   57                   | push                edi
            //   e8????????           |                     
            //   83c404               | add                 esp, 4

        $sequence_7 = { 50 68???????? e8???????? 83c414 8d4c2414 51 8d542428 }
            // n = 7, score = 300
            //   50                   | push                eax
            //   68????????           |                     
            //   e8????????           |                     
            //   83c414               | add                 esp, 0x14
            //   8d4c2414             | lea                 ecx, dword ptr [esp + 0x14]
            //   51                   | push                ecx
            //   8d542428             | lea                 edx, dword ptr [esp + 0x28]

        $sequence_8 = { 014110 8b4314 014114 8b4318 }
            // n = 4, score = 200
            //   014110               | add                 dword ptr [ecx + 0x10], eax
            //   8b4314               | mov                 eax, dword ptr [ebx + 0x14]
            //   014114               | add                 dword ptr [ecx + 0x14], eax
            //   8b4318               | mov                 eax, dword ptr [ebx + 0x18]

        $sequence_9 = { 0101 8b4304 014104 8b4308 014108 }
            // n = 5, score = 200
            //   0101                 | add                 dword ptr [ecx], eax
            //   8b4304               | mov                 eax, dword ptr [ebx + 4]
            //   014104               | add                 dword ptr [ecx + 4], eax
            //   8b4308               | mov                 eax, dword ptr [ebx + 8]
            //   014108               | add                 dword ptr [ecx + 8], eax

        $sequence_10 = { 01410c 8b4310 014110 8b4314 }
            // n = 4, score = 200
            //   01410c               | add                 dword ptr [ecx + 0xc], eax
            //   8b4310               | mov                 eax, dword ptr [ebx + 0x10]
            //   014110               | add                 dword ptr [ecx + 0x10], eax
            //   8b4314               | mov                 eax, dword ptr [ebx + 0x14]

        $sequence_11 = { 013c13 83c102 46 ebd3 }
            // n = 4, score = 200
            //   013c13               | add                 dword ptr [ebx + edx], edi
            //   83c102               | add                 ecx, 2
            //   46                   | inc                 esi
            //   ebd3                 | jmp                 0xffffffd5

        $sequence_12 = { 891424 ff90bc020000 8b8d6cffffff 52 83c008 8944240c 895c2408 }
            // n = 7, score = 200
            //   891424               | mov                 dword ptr [esp], edx
            //   ff90bc020000         | call                dword ptr [eax + 0x2bc]
            //   8b8d6cffffff         | mov                 ecx, dword ptr [ebp - 0x94]
            //   52                   | push                edx
            //   83c008               | add                 eax, 8
            //   8944240c             | mov                 dword ptr [esp + 0xc], eax
            //   895c2408             | mov                 dword ptr [esp + 8], ebx

        $sequence_13 = { 014114 8b4318 014118 8b431c }
            // n = 4, score = 200
            //   014114               | add                 dword ptr [ecx + 0x14], eax
            //   8b4318               | mov                 eax, dword ptr [ebx + 0x18]
            //   014118               | add                 dword ptr [ecx + 0x18], eax
            //   8b431c               | mov                 eax, dword ptr [ebx + 0x1c]

        $sequence_14 = { 0119 117104 83c110 83c210 }
            // n = 4, score = 200
            //   0119                 | add                 dword ptr [ecx], ebx
            //   117104               | adc                 dword ptr [ecx + 4], esi
            //   83c110               | add                 ecx, 0x10
            //   83c210               | add                 edx, 0x10

        $sequence_15 = { 014108 8b430c 01410c 8b4310 }
            // n = 4, score = 200
            //   014108               | add                 dword ptr [ecx + 8], eax
            //   8b430c               | mov                 eax, dword ptr [ebx + 0xc]
            //   01410c               | add                 dword ptr [ecx + 0xc], eax
            //   8b4310               | mov                 eax, dword ptr [ebx + 0x10]

    condition:
        7 of them and filesize < 335872
}
Download all Yara Rules