SYMBOLCOMMON_NAMEaka. SYNONYMS
win.sdbbot (Back to overview)

SDBbot

Actor(s): TA505


There is no description at this point.

References
2021-03Group-IBOleg Skulkin, Roman Rezvukhin, Semyon Rogachev
@techreport{skulkin:202103:ransomware:992ca10, author = {Oleg Skulkin and Roman Rezvukhin and Semyon Rogachev}, title = {{Ransomware Uncovered 2020/2021}}, date = {2021-03}, institution = {Group-IB}, url = {https://web.archive.org/web/20210305181115/https://cisoclub.ru/doc/otchet-kompanii-group-ib-ransomware-uncovered-2020-2021/?bp-attachment=group-ib_ransomware_uncovered_2020-2021.pdf}, language = {English}, urldate = {2021-06-16} } Ransomware Uncovered 2020/2021
RansomEXX BazarBackdoor Buer Clop Conti DoppelPaymer Dridex Egregor IcedID Maze PwndLocker QakBot RansomEXX REvil Ryuk SDBbot TrickBot Zloader
2021-02-02CRONUPGermán Fernández
@online{fernndez:20210202:de:6ff4f3a, author = {Germán Fernández}, title = {{De ataque con Malware a incidente de Ransomware}}, date = {2021-02-02}, organization = {CRONUP}, url = {https://www.cronup.com/post/de-ataque-con-malware-a-incidente-de-ransomware}, language = {Spanish}, urldate = {2021-03-02} } De ataque con Malware a incidente de Ransomware
Avaddon BazarBackdoor Buer Clop Cobalt Strike Conti DanaBot Dharma Dridex Egregor Emotet Empire Downloader FriedEx GootKit IcedID MegaCortex Nemty Phorpiex PwndLocker PyXie QakBot RansomEXX REvil Ryuk SDBbot SmokeLoader TrickBot Zloader
2020-11-20ZDNetCatalin Cimpanu
@online{cimpanu:20201120:malware:0b8ff59, author = {Catalin Cimpanu}, title = {{The malware that usually installs ransomware and you need to remove right away}}, date = {2020-11-20}, organization = {ZDNet}, url = {https://www.zdnet.com/article/the-malware-that-usually-installs-ransomware-and-you-need-to-remove-right-away/}, language = {English}, urldate = {2020-11-23} } The malware that usually installs ransomware and you need to remove right away
Avaddon BazarBackdoor Buer Clop Cobalt Strike Conti DoppelPaymer Dridex Egregor Emotet FriedEx MegaCortex Phorpiex PwndLocker QakBot Ryuk SDBbot TrickBot Zloader
2020-11-16Fox-ITAntonis Terefos, Anne Postma, Tera0017
@online{terefos:20201116:ta505:8449383, author = {Antonis Terefos and Anne Postma and Tera0017}, title = {{TA505: A Brief History Of Their Time}}, date = {2020-11-16}, organization = {Fox-IT}, url = {https://blog.fox-it.com/2020/11/16/ta505-a-brief-history-of-their-time/}, language = {English}, urldate = {2020-11-23} } TA505: A Brief History Of Their Time
Clop Get2 SDBbot TA505
2020-11-12Australian Cyber Security CentreAustralian Cyber Security Centre (ACSC)
@online{acsc:20201112:biotech:edf0f4a, author = {Australian Cyber Security Centre (ACSC)}, title = {{Biotech research firm Miltenyi Biotec hit by ransomware, data leaked}}, date = {2020-11-12}, organization = {Australian Cyber Security Centre}, url = {https://www.cyber.gov.au/acsc/view-all-content/alerts/sdbbot-targeting-health-sector}, language = {English}, urldate = {2020-11-18} } Biotech research firm Miltenyi Biotec hit by ransomware, data leaked
SDBbot
2020-10-06TelekomThomas Barabosch
@online{barabosch:20201006:eager:54da318, author = {Thomas Barabosch}, title = {{Eager Beaver: A Short Overview of the Restless Threat Actor TA505}}, date = {2020-10-06}, organization = {Telekom}, url = {https://www.telekom.com/en/blog/group/article/eager-beaver-a-short-overview-of-the-restless-threat-actor-ta505-609546}, language = {English}, urldate = {2020-10-08} } Eager Beaver: A Short Overview of the Restless Threat Actor TA505
Clop Get2 SDBbot TA505
2020-09-30CERT-XLMPaul Jung
@techreport{jung:20200930:another:5edbad3, author = {Paul Jung}, title = {{Another Threat Actor day...}}, date = {2020-09-30}, institution = {CERT-XLM}, url = {https://vblocalhost.com/uploads/VB2020-Jung.pdf}, language = {English}, urldate = {2020-12-08} } Another Threat Actor day...
SDBbot
2020-08-20CERT-FRCERT-FR
@techreport{certfr:20200820:development:d518522, author = {CERT-FR}, title = {{Development of the Activity of the TA505 Cybercriminal Group}}, date = {2020-08-20}, institution = {CERT-FR}, url = {https://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-009.pdf}, language = {English}, urldate = {2020-08-28} } Development of the Activity of the TA505 Cybercriminal Group
AndroMut Bart Clop Dridex FlawedAmmyy FlawedGrace Get2 Locky Marap QuantLoader SDBbot ServHelper tRat TrickBot
2020-06-22CERT-FRCERT-FR
@techreport{certfr:20200622:volution:fba1cfa, author = {CERT-FR}, title = {{Évolution De Lactivité du Groupe Cybercriminel TA505}}, date = {2020-06-22}, institution = {CERT-FR}, url = {https://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-006.pdf}, language = {French}, urldate = {2020-06-24} } Évolution De Lactivité du Groupe Cybercriminel TA505
Amadey AndroMut Bart Clop Dridex FlawedGrace Gandcrab Get2 GlobeImposter Jaff Locky Marap Philadephia Ransom QuantLoader Scarab Ransomware SDBbot ServHelper Silence tRat TrickBot
2020-06-16TelekomThomas Barabosch
@online{barabosch:20200616:ta505:619f2c6, author = {Thomas Barabosch}, title = {{TA505 returns with a new bag of tricks}}, date = {2020-06-16}, organization = {Telekom}, url = {https://www.telekom.com/en/blog/group/article/cybersecurity-ta505-returns-with-a-new-bag-of-tricks-602104}, language = {English}, urldate = {2020-06-18} } TA505 returns with a new bag of tricks
Clop Get2 SDBbot TA505
2020-05-21Intel 471Intel 471
@online{471:20200521:brief:048d164, author = {Intel 471}, title = {{A brief history of TA505}}, date = {2020-05-21}, organization = {Intel 471}, url = {https://intel471.com/blog/a-brief-history-of-ta505}, language = {English}, urldate = {2022-02-14} } A brief history of TA505
AndroMut Bart Dridex FlawedAmmyy FlawedGrace Gandcrab Get2 GlobeImposter Jaff Kegotip Locky Necurs Philadephia Ransom Pony QuantLoader Rockloader SDBbot ServHelper Shifu Snatch TrickBot
2020-04-09Github (Tera0017)Tera0017
@online{tera0017:20200409:sdbbot:a6c333e, author = {Tera0017}, title = {{SDBbot Unpacker}}, date = {2020-04-09}, organization = {Github (Tera0017)}, url = {https://github.com/Tera0017/SDBbot-Unpacker}, language = {English}, urldate = {2020-04-13} } SDBbot Unpacker
SDBbot
2020-03-26TelekomThomas Barabosch
@online{barabosch:20200326:ta505s:24d9805, author = {Thomas Barabosch}, title = {{TA505's Box of Chocolate - On Hidden Gems packed with the TA505 Packer}}, date = {2020-03-26}, organization = {Telekom}, url = {https://www.telekom.com/en/blog/group/article/cybersecurity-ta505-s-box-of-chocolate-597672}, language = {English}, urldate = {2020-03-27} } TA505's Box of Chocolate - On Hidden Gems packed with the TA505 Packer
Amadey Azorult Clop FlawedGrace Get2 SDBbot Silence TinyMet TA505
2020-03-04CrowdStrikeCrowdStrike
@techreport{crowdstrike:20200304:2020:818c85f, author = {CrowdStrike}, title = {{2020 CrowdStrike Global Threat Report}}, date = {2020-03-04}, institution = {CrowdStrike}, url = {https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf}, language = {English}, urldate = {2020-07-24} } 2020 CrowdStrike Global Threat Report
MESSAGETAP More_eggs 8.t Dropper Anchor BabyShark BadNews Clop Cobalt Strike CobInt Cobra Carbon System Cutwail DanaBot Dharma DoppelDridex DoppelPaymer Dridex Emotet FlawedAmmyy FriedEx Gandcrab Get2 IcedID ISFB KerrDown LightNeuron LockerGoga Maze MECHANICAL Necurs Nokki Outlook Backdoor Phobos Predator The Thief QakBot REvil RobinHood Ryuk SDBbot Skipper SmokeLoader TerraRecon TerraStealer TerraTV TinyLoader TrickBot Vidar Winnti ANTHROPOID SPIDER APT23 APT31 APT39 APT40 BlackTech BuhTrap Charming Kitten CLOCKWORK SPIDER DOPPEL SPIDER FIN7 Gamaredon Group GOBLIN PANDA MONTY SPIDER MUSTANG PANDA NARWHAL SPIDER NOCTURNAL SPIDER PINCHY SPIDER SALTY SPIDER SCULLY SPIDER SMOKY SPIDER Thrip VENOM SPIDER VICEROY TIGER
2020-02-28Financial Security InstituteFinancial Security Institute
@online{institute:20200228:profiling:ebaa39b, author = {Financial Security Institute}, title = {{Profiling of TA505 Threat Group That Continues to Attack the Financial Sector}}, date = {2020-02-28}, organization = {Financial Security Institute}, url = {https://www.fsec.or.kr/common/proc/fsec/bbs/163/fileDownLoad/2297.do}, language = {English}, urldate = {2020-02-28} } Profiling of TA505 Threat Group That Continues to Attack the Financial Sector
Amadey Clop FlawedAmmyy Rapid Ransom SDBbot TinyMet
2020-02-13QianxinQi Anxin Threat Intelligence Center
@techreport{center:20200213:report:146d333, author = {Qi Anxin Threat Intelligence Center}, title = {{APT Report 2019}}, date = {2020-02-13}, institution = {Qianxin}, url = {https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf}, language = {English}, urldate = {2020-02-27} } APT Report 2019
Chrysaor Exodus Dacls VPNFilter DNSRat Griffon KopiLuwak More_eggs SQLRat AppleJeus BONDUPDATER Agent.BTZ Anchor AndroMut AppleJeus BOOSTWRITE Brambul Carbanak Cobalt Strike Dacls DistTrack DNSpionage Dtrack ELECTRICFISH FlawedAmmyy FlawedGrace Get2 Grateful POS HOPLIGHT Imminent Monitor RAT jason Joanap KerrDown KEYMARBLE Lambert LightNeuron LoJax MiniDuke PolyglotDuke PowerRatankba Rising Sun SDBbot ServHelper Snatch Stuxnet TinyMet tRat TrickBot Volgmer X-Agent Zebrocy
2020-01-14TelekomThomas Barabosch
@online{barabosch:20200114:inside:2187ad3, author = {Thomas Barabosch}, title = {{Inside of CL0P’s ransomware operation}}, date = {2020-01-14}, organization = {Telekom}, url = {https://www.telekom.com/en/blog/group/article/inside-of-cl0p-s-ransomware-operation-615824}, language = {English}, urldate = {2021-01-14} } Inside of CL0P’s ransomware operation
Clop Get2 SDBbot
2020SecureworksSecureWorks
@online{secureworks:2020:gold:f38f910, author = {SecureWorks}, title = {{GOLD TAHOE}}, date = {2020}, organization = {Secureworks}, url = {https://www.secureworks.com/research/threat-profiles/gold-tahoe}, language = {English}, urldate = {2020-05-23} } GOLD TAHOE
Clop FlawedAmmyy FlawedGrace Get2 SDBbot ServHelper TA505
2019-10-16ProofpointDennis Schwarz, Kafeine, Matthew Mesa, Axel F, Proofpoint Threat Insight Team
@online{schwarz:20191016:ta505:9d7155a, author = {Dennis Schwarz and Kafeine and Matthew Mesa and Axel F and Proofpoint Threat Insight Team}, title = {{TA505 Distributes New SDBbot Remote Access Trojan with Get2 Downloader}}, date = {2019-10-16}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/threat-insight/post/ta505-distributes-new-sdbbot-remote-access-trojan-get2-downloader}, language = {English}, urldate = {2020-01-10} } TA505 Distributes New SDBbot Remote Access Trojan with Get2 Downloader
Get2 SDBbot TA505
2019-10-10AhnLabASEC Analysis Team
@techreport{team:20191010:asec:6452cd4, author = {ASEC Analysis Team}, title = {{ASEC Report Vol. 96: Analysis Report on Operation Red Salt, Analysis on the Malicious SDB File Found in Ammyy Hacking Tool}}, date = {2019-10-10}, institution = {AhnLab}, url = {https://global.ahnlab.com/global/upload/download/asecreport/ASEC%20REPORT_vol.96_ENG.pdf}, language = {English}, urldate = {2022-04-15} } ASEC Report Vol. 96: Analysis Report on Operation Red Salt, Analysis on the Malicious SDB File Found in Ammyy Hacking Tool
SDBbot
Yara Rules
[TLP:WHITE] win_sdbbot_auto (20230125 | Detects win.sdbbot.)
rule win_sdbbot_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-01-25"
        version = "1"
        description = "Detects win.sdbbot."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.sdbbot"
        malpedia_rule_date = "20230124"
        malpedia_hash = "2ee0eebba83dce3d019a90519f2f972c0fcf9686"
        malpedia_version = "20230125"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 013c31 eb27 6683f801 7511 81e1ff0f0000 8bc7 }
            // n = 6, score = 800
            //   013c31               | add                 dword ptr [ecx + esi], edi
            //   eb27                 | jmp                 0x29
            //   6683f801             | cmp                 ax, 1
            //   7511                 | jne                 0x13
            //   81e1ff0f0000         | and                 ecx, 0xfff
            //   8bc7                 | mov                 eax, edi

        $sequence_1 = { 8907 83c704 85f6 8d4604 0f44c6 833f00 }
            // n = 6, score = 800
            //   8907                 | mov                 dword ptr [edi], eax
            //   83c704               | add                 edi, 4
            //   85f6                 | test                esi, esi
            //   8d4604               | lea                 eax, [esi + 4]
            //   0f44c6               | cmove               eax, esi
            //   833f00               | cmp                 dword ptr [edi], 0

        $sequence_2 = { 8b0418 03c3 eb0f 8b07 }
            // n = 4, score = 800
            //   8b0418               | mov                 eax, dword ptr [eax + ebx]
            //   03c3                 | add                 eax, ebx
            //   eb0f                 | jmp                 0x11
            //   8b07                 | mov                 eax, dword ptr [edi]

        $sequence_3 = { 8b37 8b55fc 03f2 8b7f10 03fa }
            // n = 5, score = 800
            //   8b37                 | mov                 esi, dword ptr [edi]
            //   8b55fc               | mov                 edx, dword ptr [ebp - 4]
            //   03f2                 | add                 esi, edx
            //   8b7f10               | mov                 edi, dword ptr [edi + 0x10]
            //   03fa                 | add                 edi, edx

        $sequence_4 = { 8bc7 c1e810 66010431 eb10 }
            // n = 4, score = 800
            //   8bc7                 | mov                 eax, edi
            //   c1e810               | shr                 eax, 0x10
            //   66010431             | add                 word ptr [ecx + esi], ax
            //   eb10                 | jmp                 0x12

        $sequence_5 = { 83c002 8945e8 85db 759d }
            // n = 4, score = 800
            //   83c002               | add                 eax, 2
            //   8945e8               | mov                 dword ptr [ebp - 0x18], eax
            //   85db                 | test                ebx, ebx
            //   759d                 | jne                 0xffffff9f

        $sequence_6 = { 750b 81e2ff0f0000 013c32 eb38 6683f803 }
            // n = 5, score = 800
            //   750b                 | jne                 0xd
            //   81e2ff0f0000         | and                 edx, 0xfff
            //   013c32               | add                 dword ptr [edx + esi], edi
            //   eb38                 | jmp                 0x3a
            //   6683f803             | cmp                 ax, 3

        $sequence_7 = { 3df232f60e 7507 8b01 03c6 }
            // n = 4, score = 800
            //   3df232f60e           | cmp                 eax, 0xef632f2
            //   7507                 | jne                 9
            //   8b01                 | mov                 eax, dword ptr [ecx]
            //   03c6                 | add                 eax, esi

        $sequence_8 = { c744245c00000000 c744246000000000 ffd7 85c0 0f88a0000000 }
            // n = 5, score = 400
            //   c744245c00000000     | mov                 dword ptr [esp + 0x5c], 0
            //   c744246000000000     | mov                 dword ptr [esp + 0x60], 0
            //   ffd7                 | call                edi
            //   85c0                 | test                eax, eax
            //   0f88a0000000         | js                  0xa6

        $sequence_9 = { 80eb61 0fb6d1 80fb19 0fb6cd 0f47d1 0fbeca }
            // n = 6, score = 400
            //   80eb61               | sub                 bl, 0x61
            //   0fb6d1               | movzx               edx, cl
            //   80fb19               | cmp                 bl, 0x19
            //   0fb6cd               | movzx               ecx, ch
            //   0f47d1               | cmova               edx, ecx
            //   0fbeca               | movsx               ecx, dl

        $sequence_10 = { 8d442434 50 ffd6 8d442438 c744244018000000 89442448 }
            // n = 6, score = 400
            //   8d442434             | lea                 eax, [esp + 0x34]
            //   50                   | push                eax
            //   ffd6                 | call                esi
            //   8d442438             | lea                 eax, [esp + 0x38]
            //   c744244018000000     | mov                 dword ptr [esp + 0x40], 0x18
            //   89442448             | mov                 dword ptr [esp + 0x48], eax

        $sequence_11 = { 50 c744245840000000 c744245c00000000 c744246000000000 }
            // n = 4, score = 400
            //   50                   | push                eax
            //   c744245840000000     | mov                 dword ptr [esp + 0x58], 0x40
            //   c744245c00000000     | mov                 dword ptr [esp + 0x5c], 0
            //   c744246000000000     | mov                 dword ptr [esp + 0x60], 0

        $sequence_12 = { ffd0 6800800000 8d442424 c744242400000000 50 }
            // n = 5, score = 400
            //   ffd0                 | call                eax
            //   6800800000           | push                0x8000
            //   8d442424             | lea                 eax, [esp + 0x24]
            //   c744242400000000     | mov                 dword ptr [esp + 0x24], 0
            //   50                   | push                eax

        $sequence_13 = { 6a40 6800300000 89442424 8d442424 50 }
            // n = 5, score = 400
            //   6a40                 | push                0x40
            //   6800300000           | push                0x3000
            //   89442424             | mov                 dword ptr [esp + 0x24], eax
            //   8d442424             | lea                 eax, [esp + 0x24]
            //   50                   | push                eax

        $sequence_14 = { 742e 8add c1c80d 8acd }
            // n = 4, score = 400
            //   742e                 | je                  0x30
            //   8add                 | mov                 bl, ch
            //   c1c80d               | ror                 eax, 0xd
            //   8acd                 | mov                 cl, ch

        $sequence_15 = { 8a01 8d4901 88440eff 83ea01 75f2 }
            // n = 5, score = 400
            //   8a01                 | mov                 al, byte ptr [ecx]
            //   8d4901               | lea                 ecx, [ecx + 1]
            //   88440eff             | mov                 byte ptr [esi + ecx - 1], al
            //   83ea01               | sub                 edx, 1
            //   75f2                 | jne                 0xfffffff4

        $sequence_16 = { 4a8b0402 498d0c01 4a890c02 eb3c 6683f903 }
            // n = 5, score = 300
            //   4a8b0402             | movzx               eax, dx
            //   498d0c01             | je                  0x9a
            //   4a890c02             | inc                 esp
            //   eb3c                 | mov                 eax, dword ptr [ebx]
            //   6683f903             | dec                 esp

        $sequence_17 = { 6690 410fb713 49ffca 0fb7ca 0fb7c2 }
            // n = 5, score = 300
            //   6690                 | dec                 eax
            //   410fb713             | mov                 eax, dword ptr [0x60]
            //   49ffca               | inc                 ecx
            //   0fb7ca               | mov                 ebx, 1
            //   0fb7c2               | dec                 eax

        $sequence_18 = { ebd9 65488b042560000000 41bb01000000 48897c2438 4c89ac2488000000 }
            // n = 5, score = 300
            //   ebd9                 | dec                 ecx
            //   65488b042560000000     | mov    ecx, ebp
            //   41bb01000000         | dec                 eax
            //   48897c2438           | test                edx, edx
            //   4c89ac2488000000     | jmp                 0xffffffdb

        $sequence_19 = { 4d85c0 741b 482bd1 0f1f840000000000 }
            // n = 4, score = 300
            //   4d85c0               | movzx               edx, word ptr [ebx]
            //   741b                 | dec                 ecx
            //   482bd1               | dec                 edx
            //   0f1f840000000000     | movzx               ecx, dx

        $sequence_20 = { 4533c0 0fb601 0f1f4000 41c1c80d 488d4901 0fbec0 }
            // n = 6, score = 300
            //   4533c0               | lea                 edx, [eax - 8]
            //   0fb601               | dec                 ebp
            //   0f1f4000             | add                 eax, esi
            //   41c1c80d             | dec                 esp
            //   488d4901             | lea                 ebx, [ebx + 8]
            //   0fbec0               | dec                 ebp

        $sequence_21 = { 0f1f8000000000 0fb602 48ffc2 8801 488d4901 4983e801 75ee }
            // n = 7, score = 300
            //   0f1f8000000000       | test                eax, eax
            //   0fb602               | je                  0x1d
            //   48ffc2               | dec                 eax
            //   8801                 | sub                 edx, ecx
            //   488d4901             | nop                 dword ptr [eax + eax]
            //   4983e801             | dec                 edx
            //   75ee                 | mov                 eax, dword ptr [edx + eax]

        $sequence_22 = { 4c8bf0 ffd5 418b5754 498bcd 4885d2 }
            // n = 5, score = 300
            //   4c8bf0               | dec                 esp
            //   ffd5                 | mov                 esi, eax
            //   418b5754             | call                ebp
            //   498bcd               | inc                 ecx
            //   4885d2               | mov                 edx, dword ptr [edi + 0x54]

        $sequence_23 = { 0f8494000000 448b03 4c8d50f8 4d03c6 4c8d5b08 }
            // n = 5, score = 300
            //   0f8494000000         | mov                 dword ptr [esp + 0x38], edi
            //   448b03               | dec                 esp
            //   4c8d50f8             | mov                 dword ptr [esp + 0x88], ebp
            //   4d03c6               | nop                 
            //   4c8d5b08             | inc                 ecx

    condition:
        7 of them and filesize < 1015808
}
Download all Yara Rules