SYMBOLCOMMON_NAMEaka. SYNONYMS
win.saint_bot (Back to overview)

Saint Bot


There is no description at this point.

References
2022-07-18Palo Alto Networks Unit 42Unit 42
@online{42:20220718:nascent:4d2484b, author = {Unit 42}, title = {{Nascent Ursa}}, date = {2022-07-18}, organization = {Palo Alto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/atoms/nascentursa/}, language = {English}, urldate = {2022-07-25} } Nascent Ursa
Saint Bot SaintBear
2022-04-07InQuestWill MacArthur, Nick Chalard
@online{macarthur:20220407:ukraine:99bef5a, author = {Will MacArthur and Nick Chalard}, title = {{Ukraine CyberWar Overview}}, date = {2022-04-07}, organization = {InQuest}, url = {https://inquest.net/blog/2022/04/07/ukraine-cyberwar-overview}, language = {English}, urldate = {2022-04-29} } Ukraine CyberWar Overview
CyclopsBlink Cobalt Strike GraphSteel GrimPlant HermeticWiper HermeticWizard MicroBackdoor PartyTicket Saint Bot Scieron WhisperGate
2022-03-03LIFARSLIFARS
@online{lifars:20220303:closer:f29cc25, author = {LIFARS}, title = {{A Closer Look at the Russian Actors Targeting Organizations in Ukraine}}, date = {2022-03-03}, organization = {LIFARS}, url = {https://lifars.com/2022/03/a-closer-look-at-the-russian-actors-targeting-organizations-in-ukraine/}, language = {English}, urldate = {2022-03-04} } A Closer Look at the Russian Actors Targeting Organizations in Ukraine
HermeticWiper IsaacWiper Saint Bot WhisperGate
2022-02-25paloalto Networks Unit 42Unit 42
@online{42:20220225:spear:34925b2, author = {Unit 42}, title = {{Spear Phishing Attacks Target Organizations in Ukraine, Payloads Include the Document Stealer OutSteel and the Downloader SaintBot}}, date = {2022-02-25}, organization = {paloalto Networks Unit 42}, url = {https://unit42.paloaltonetworks.com/ukraine-targeted-outsteel-saintbot/}, language = {English}, urldate = {2022-03-01} } Spear Phishing Attacks Target Organizations in Ukraine, Payloads Include the Document Stealer OutSteel and the Downloader SaintBot
Saint Bot
2022-02-02Cert-UACert-UA
@online{certua:20220202:uac0056:c1fdb5c, author = {Cert-UA}, title = {{UAC-0056 cyberattack on Ukrainian state organizations using SaintBot and OutSteel malware (CERT-UA#3799)}}, date = {2022-02-02}, organization = {Cert-UA}, url = {https://cert.gov.ua/article/18419}, language = {Ukrainian}, urldate = {2022-05-04} } UAC-0056 cyberattack on Ukrainian state organizations using SaintBot and OutSteel malware (CERT-UA#3799)
Saint Bot
2022-01-31CyberScoopAJ Vicens
@online{vicens:20220131:conversation:464d1e3, author = {AJ Vicens}, title = {{Conversation with a top Ukrainian cyber official: What we know, what we don't, what it means}}, date = {2022-01-31}, organization = {CyberScoop}, url = {https://www.cyberscoop.com/ukrainian-cyber-attacks-russia-conflict-q-and-a/}, language = {English}, urldate = {2022-02-02} } Conversation with a top Ukrainian cyber official: What we know, what we don't, what it means
Saint Bot
2021-04-06MalwarebytesThreat Intelligence Team
@online{team:20210406:deep:6279974, author = {Threat Intelligence Team}, title = {{A deep dive into Saint Bot, a new downloader}}, date = {2021-04-06}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2021/04/a-deep-dive-into-saint-bot-downloader/}, language = {English}, urldate = {2021-04-12} } A deep dive into Saint Bot, a new downloader
Saint Bot
Yara Rules
[TLP:WHITE] win_saint_bot_auto (20230715 | Detects win.saint_bot.)
rule win_saint_bot_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-07-11"
        version = "1"
        description = "Detects win.saint_bot."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.saint_bot"
        malpedia_rule_date = "20230705"
        malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41"
        malpedia_version = "20230715"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { e8???????? 68???????? 8945e4 e8???????? 53 8945e0 }
            // n = 6, score = 100
            //   e8????????           |                     
            //   68????????           |                     
            //   8945e4               | mov                 dword ptr [ebp - 0x1c], eax
            //   e8????????           |                     
            //   53                   | push                ebx
            //   8945e0               | mov                 dword ptr [ebp - 0x20], eax

        $sequence_1 = { a3???????? 56 ffd7 ff75dc }
            // n = 4, score = 100
            //   a3????????           |                     
            //   56                   | push                esi
            //   ffd7                 | call                edi
            //   ff75dc               | push                dword ptr [ebp - 0x24]

        $sequence_2 = { 57 ff75f0 53 50 68e9fd0000 ff15???????? }
            // n = 6, score = 100
            //   57                   | push                edi
            //   ff75f0               | push                dword ptr [ebp - 0x10]
            //   53                   | push                ebx
            //   50                   | push                eax
            //   68e9fd0000           | push                0xfde9
            //   ff15????????         |                     

        $sequence_3 = { a3???????? 56 ffd7 a3???????? 8b35???????? }
            // n = 5, score = 100
            //   a3????????           |                     
            //   56                   | push                esi
            //   ffd7                 | call                edi
            //   a3????????           |                     
            //   8b35????????         |                     

        $sequence_4 = { 761d 03d2 6a02 52 }
            // n = 4, score = 100
            //   761d                 | jbe                 0x1f
            //   03d2                 | add                 edx, edx
            //   6a02                 | push                2
            //   52                   | push                edx

        $sequence_5 = { 57 e8???????? ff75f4 68e8030000 57 e8???????? 57 }
            // n = 7, score = 100
            //   57                   | push                edi
            //   e8????????           |                     
            //   ff75f4               | push                dword ptr [ebp - 0xc]
            //   68e8030000           | push                0x3e8
            //   57                   | push                edi
            //   e8????????           |                     
            //   57                   | push                edi

        $sequence_6 = { ff15???????? 8b45fc 47 3bf8 7ec4 8b7dec 85db }
            // n = 7, score = 100
            //   ff15????????         |                     
            //   8b45fc               | mov                 eax, dword ptr [ebp - 4]
            //   47                   | inc                 edi
            //   3bf8                 | cmp                 edi, eax
            //   7ec4                 | jle                 0xffffffc6
            //   8b7dec               | mov                 edi, dword ptr [ebp - 0x14]
            //   85db                 | test                ebx, ebx

        $sequence_7 = { e8???????? 68???????? 8945dc e8???????? ff75dc 8bd8 }
            // n = 6, score = 100
            //   e8????????           |                     
            //   68????????           |                     
            //   8945dc               | mov                 dword ptr [ebp - 0x24], eax
            //   e8????????           |                     
            //   ff75dc               | push                dword ptr [ebp - 0x24]
            //   8bd8                 | mov                 ebx, eax

        $sequence_8 = { ff75d8 a3???????? 53 ffd7 ff75dc a3???????? 53 }
            // n = 7, score = 100
            //   ff75d8               | push                dword ptr [ebp - 0x28]
            //   a3????????           |                     
            //   53                   | push                ebx
            //   ffd7                 | call                edi
            //   ff75dc               | push                dword ptr [ebp - 0x24]
            //   a3????????           |                     
            //   53                   | push                ebx

        $sequence_9 = { ffd7 ff75ec a3???????? 53 ffd7 a3???????? 8b45fc }
            // n = 7, score = 100
            //   ffd7                 | call                edi
            //   ff75ec               | push                dword ptr [ebp - 0x14]
            //   a3????????           |                     
            //   53                   | push                ebx
            //   ffd7                 | call                edi
            //   a3????????           |                     
            //   8b45fc               | mov                 eax, dword ptr [ebp - 4]

    condition:
        7 of them and filesize < 93184
}
Download all Yara Rules