SYMBOLCOMMON_NAMEaka. SYNONYMS
win.sdbbot (Back to overview)

SDBbot

Actor(s): TA505


There is no description at this point.

References
2020-11-20ZDNetCatalin Cimpanu
@online{cimpanu:20201120:malware:0b8ff59, author = {Catalin Cimpanu}, title = {{The malware that usually installs ransomware and you need to remove right away}}, date = {2020-11-20}, organization = {ZDNet}, url = {https://www.zdnet.com/article/the-malware-that-usually-installs-ransomware-and-you-need-to-remove-right-away/}, language = {English}, urldate = {2020-11-23} } The malware that usually installs ransomware and you need to remove right away
Avaddon Ransomware BazarBackdoor Buer Clop Cobalt Strike Conti Ransomware DoppelPaymer Dridex Egregor Emotet FriedEx MegaCortex Phorpiex PwndLocker QakBot Ryuk SDBbot TrickBot Zloader
2020-11-16Fox-ITAntonis Terefos, Anne Postma, Tera0017
@online{terefos:20201116:ta505:8449383, author = {Antonis Terefos and Anne Postma and Tera0017}, title = {{TA505: A Brief History Of Their Time}}, date = {2020-11-16}, organization = {Fox-IT}, url = {https://blog.fox-it.com/2020/11/16/ta505-a-brief-history-of-their-time/}, language = {English}, urldate = {2020-11-23} } TA505: A Brief History Of Their Time
Clop Get2 SDBbot TA505
2020-11-12Australian Cyber Security CentreAustralian Cyber Security Centre (ACSC)
@online{acsc:20201112:biotech:edf0f4a, author = {Australian Cyber Security Centre (ACSC)}, title = {{Biotech research firm Miltenyi Biotec hit by ransomware, data leaked}}, date = {2020-11-12}, organization = {Australian Cyber Security Centre}, url = {https://www.cyber.gov.au/acsc/view-all-content/alerts/sdbbot-targeting-health-sector}, language = {English}, urldate = {2020-11-18} } Biotech research firm Miltenyi Biotec hit by ransomware, data leaked
SDBbot
2020-10-06TelekomThomas Barabosch
@online{barabosch:20201006:eager:54da318, author = {Thomas Barabosch}, title = {{Eager Beaver: A Short Overview of the Restless Threat Actor TA505}}, date = {2020-10-06}, organization = {Telekom}, url = {https://www.telekom.com/en/blog/group/article/eager-beaver-a-short-overview-of-the-restless-threat-actor-ta505-609546}, language = {English}, urldate = {2020-10-08} } Eager Beaver: A Short Overview of the Restless Threat Actor TA505
Clop Get2 SDBbot TA505
2020-08-20CERT-FRCERT-FR
@techreport{certfr:20200820:development:d518522, author = {CERT-FR}, title = {{Development of the Activity of the TA505 Cybercriminal Group}}, date = {2020-08-20}, institution = {CERT-FR}, url = {https://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-009.pdf}, language = {English}, urldate = {2020-08-28} } Development of the Activity of the TA505 Cybercriminal Group
AndroMut Bart Clop Dridex FlawedAmmyy FlawedGrace Get2 Locky Marap QuantLoader SDBbot ServHelper tRat TrickBot
2020-06-22CERT-FRCERT-FR
@techreport{certfr:20200622:volution:fba1cfa, author = {CERT-FR}, title = {{Évolution De Lactivité du Groupe Cybercriminel TA505}}, date = {2020-06-22}, institution = {CERT-FR}, url = {https://www.cert.ssi.gouv.fr/uploads/CERTFR-2020-CTI-006.pdf}, language = {French}, urldate = {2020-06-24} } Évolution De Lactivité du Groupe Cybercriminel TA505
Amadey AndroMut Bart Clop Dridex FlawedGrace Gandcrab Get2 GlobeImposter Jaff Locky Marap Philadephia Ransom QuantLoader Scarab Ransomware SDBbot ServHelper Silence tRat TrickBot
2020-06-16TelekomThomas Barabosch
@online{barabosch:20200616:ta505:619f2c6, author = {Thomas Barabosch}, title = {{TA505 returns with a new bag of tricks}}, date = {2020-06-16}, organization = {Telekom}, url = {https://www.telekom.com/en/blog/group/article/cybersecurity-ta505-returns-with-a-new-bag-of-tricks-602104}, language = {English}, urldate = {2020-06-18} } TA505 returns with a new bag of tricks
Clop Get2 SDBbot TA505
2020-05-21Intel 471Intel 471
@online{471:20200521:brief:048d164, author = {Intel 471}, title = {{A brief history of TA505}}, date = {2020-05-21}, organization = {Intel 471}, url = {https://blog.intel471.com/2020/05/21/a-brief-history-of-ta505/}, language = {English}, urldate = {2020-05-23} } A brief history of TA505
AndroMut Bart Dridex FlawedAmmyy FlawedGrace Gandcrab Get2 GlobeImposter Jaff Kegotip Locky Necurs Philadephia Ransom Pony QuantLoader Rockloader SDBbot ServHelper Shifu Snatch TrickBot
2020-04-09Github (Tera0017)Tera0017
@online{tera0017:20200409:sdbbot:a6c333e, author = {Tera0017}, title = {{SDBbot Unpacker}}, date = {2020-04-09}, organization = {Github (Tera0017)}, url = {https://github.com/Tera0017/SDBbot-Unpacker}, language = {English}, urldate = {2020-04-13} } SDBbot Unpacker
SDBbot
2020-03-26TelekomThomas Barabosch
@online{barabosch:20200326:ta505s:24d9805, author = {Thomas Barabosch}, title = {{TA505's Box of Chocolate - On Hidden Gems packed with the TA505 Packer}}, date = {2020-03-26}, organization = {Telekom}, url = {https://www.telekom.com/en/blog/group/article/cybersecurity-ta505-s-box-of-chocolate-597672}, language = {English}, urldate = {2020-03-27} } TA505's Box of Chocolate - On Hidden Gems packed with the TA505 Packer
Amadey Azorult Clop FlawedGrace Get2 SDBbot Silence TinyMet TA505
2020-03-04CrowdStrikeCrowdStrike
@techreport{crowdstrike:20200304:2020:818c85f, author = {CrowdStrike}, title = {{2020 CrowdStrike Global Threat Report}}, date = {2020-03-04}, institution = {CrowdStrike}, url = {https://go.crowdstrike.com/rs/281-OBQ-266/images/Report2020CrowdStrikeGlobalThreatReport.pdf}, language = {English}, urldate = {2020-07-24} } 2020 CrowdStrike Global Threat Report
MESSAGETAP More_eggs 8.t Dropper Anchor BabyShark BadNews Clop Cobalt Strike CobInt Cobra Carbon System Cutwail DanaBot Dharma DoppelPaymer Dridex Emotet FlawedAmmyy FriedEx Gandcrab Get2 IcedID ISFB KerrDown LightNeuron LockerGoga Maze MECHANICAL Necurs Nokki Outlook Backdoor Phobos Ransomware Predator The Thief QakBot REvil RobinHood Ryuk SDBbot Skipper SmokeLoader TerraRecon TerraStealer TerraTV TinyLoader TrickBot vidar Winnti ANTHROPOID SPIDER Anunak APT31 APT39 BlackTech BuhTrap Charming Kitten CLOCKWORD SPIDER DOPPEL SPIDER Gamaredon Group Leviathan MONTY SPIDER Mustang Panda NARWHAL SPIDER NOCTURNAL SPIDER Pinchy Spider Pirate Panda Salty Spider SCULLY SPIDER SMOKY SPIDER Thrip VENOM SPIDER
2020-02-28Financial Security InstituteFinancial Security Institute
@online{institute:20200228:profiling:ebaa39b, author = {Financial Security Institute}, title = {{Profiling of TA505 Threat Group That Continues to Attack the Financial Sector}}, date = {2020-02-28}, organization = {Financial Security Institute}, url = {https://www.fsec.or.kr/common/proc/fsec/bbs/163/fileDownLoad/2297.do}, language = {English}, urldate = {2020-02-28} } Profiling of TA505 Threat Group That Continues to Attack the Financial Sector
Amadey Clop FlawedAmmyy Rapid Ransom SDBbot TinyMet
2020-02-13QianxinQi Anxin Threat Intelligence Center
@techreport{center:20200213:report:146d333, author = {Qi Anxin Threat Intelligence Center}, title = {{APT Report 2019}}, date = {2020-02-13}, institution = {Qianxin}, url = {https://ti.qianxin.com/uploads/2020/02/13/cb78386a082f465f259b37dae5df4884.pdf}, language = {English}, urldate = {2020-02-27} } APT Report 2019
Chrysaor Exodus Dacls elf.vpnfilter DNSRat Griffon KopiLuwak More_eggs SQLRat AppleJeus BONDUPDATER Agent.BTZ Anchor AndroMut AppleJeus BOOSTWRITE Brambul Carbanak Cobalt Strike Dacls DistTrack DNSpionage Dtrack ELECTRICFISH FlawedAmmyy FlawedGrace Get2 Grateful POS HOPLIGHT Imminent Monitor RAT jason Joanap KerrDown KEYMARBLE Lambert LightNeuron LoJax MiniDuke PolyglotDuke PowerRatankba Rising Sun SDBbot ServHelper Snatch Stuxnet TinyMet tRat TrickBot Volgmer X-Agent Zebrocy
2020SecureworksSecureWorks
@online{secureworks:2020:gold:f38f910, author = {SecureWorks}, title = {{GOLD TAHOE}}, date = {2020}, organization = {Secureworks}, url = {https://www.secureworks.com/research/threat-profiles/gold-tahoe}, language = {English}, urldate = {2020-05-23} } GOLD TAHOE
Clop FlawedAmmyy FlawedGrace Get2 SDBbot ServHelper TA505
2019-10-16ProofpointDennis Schwarz, Kafeine, Matthew Mesa, Axel F, Proofpoint Threat Insight Team
@online{schwarz:20191016:ta505:9d7155a, author = {Dennis Schwarz and Kafeine and Matthew Mesa and Axel F and Proofpoint Threat Insight Team}, title = {{TA505 Distributes New SDBbot Remote Access Trojan with Get2 Downloader}}, date = {2019-10-16}, organization = {Proofpoint}, url = {https://www.proofpoint.com/us/threat-insight/post/ta505-distributes-new-sdbbot-remote-access-trojan-get2-downloader}, language = {English}, urldate = {2020-01-10} } TA505 Distributes New SDBbot Remote Access Trojan with Get2 Downloader
Get2 SDBbot TA505
2019-10-10AhnLabASEC
@techreport{asec:20191010:asec:6452cd4, author = {ASEC}, title = {{ASEC Report Vol. 96}}, date = {2019-10-10}, institution = {AhnLab}, url = {https://global.ahnlab.com/global/upload/download/asecreport/ASEC%20REPORT_vol.96_ENG.pdf}, language = {English}, urldate = {2020-01-13} } ASEC Report Vol. 96
SDBbot
Yara Rules
[TLP:WHITE] win_sdbbot_auto (20201014 | autogenerated rule brought to you by yara-signator)
rule win_sdbbot_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-10-14"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.5.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.sdbbot"
        malpedia_rule_date = "20201014"
        malpedia_hash = "a7e3bd57eaf12bf3ea29a863c041091ba3af9ac9"
        malpedia_version = "20201014"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 6a00 ff55f4 ff7350 8bf0 56 8975fc ff55ec }
            // n = 7, score = 500
            //   6a00                 | push                0
            //   ff55f4               | call                dword ptr [ebp - 0xc]
            //   ff7350               | push                dword ptr [ebx + 0x50]
            //   8bf0                 | mov                 esi, eax
            //   56                   | push                esi
            //   8975fc               | mov                 dword ptr [ebp - 4], esi
            //   ff55ec               | call                dword ptr [ebp - 0x14]

        $sequence_1 = { 0f8549feffff 8b7df8 8b5f3c 6a40 }
            // n = 4, score = 500
            //   0f8549feffff         | jne                 0xfffffe4f
            //   8b7df8               | mov                 edi, dword ptr [ebp - 8]
            //   8b5f3c               | mov                 ebx, dword ptr [edi + 0x3c]
            //   6a40                 | push                0x40

        $sequence_2 = { 7403 4f ebe2 64a130000000 897df8 }
            // n = 5, score = 500
            //   7403                 | je                  5
            //   4f                   | dec                 edi
            //   ebe2                 | jmp                 0xffffffe4
            //   64a130000000         | mov                 eax, dword ptr fs:[0x30]
            //   897df8               | mov                 dword ptr [ebp - 8], edi

        $sequence_3 = { 8bbb80000000 03fe 897dec 833f00 0f847d000000 8b470c 03c6 }
            // n = 7, score = 500
            //   8bbb80000000         | mov                 edi, dword ptr [ebx + 0x80]
            //   03fe                 | add                 edi, esi
            //   897dec               | mov                 dword ptr [ebp - 0x14], edi
            //   833f00               | cmp                 dword ptr [edi], 0
            //   0f847d000000         | je                  0x83
            //   8b470c               | mov                 eax, dword ptr [edi + 0xc]
            //   03c6                 | add                 eax, esi

        $sequence_4 = { 33c9 0fb75024 0f1f8000000000 0fb63e c1c90d 803e61 7203 }
            // n = 7, score = 500
            //   33c9                 | xor                 ecx, ecx
            //   0fb75024             | movzx               edx, word ptr [eax + 0x24]
            //   0f1f8000000000       | nop                 dword ptr [eax]
            //   0fb63e               | movzx               edi, byte ptr [esi]
            //   c1c90d               | ror                 ecx, 0xd
            //   803e61               | cmp                 byte ptr [esi], 0x61
            //   7203                 | jb                  5

        $sequence_5 = { 8b470c 03c6 50 ff55e8 8bd8 85db }
            // n = 6, score = 500
            //   8b470c               | mov                 eax, dword ptr [edi + 0xc]
            //   03c6                 | add                 eax, esi
            //   50                   | push                eax
            //   ff55e8               | call                dword ptr [ebp - 0x18]
            //   8bd8                 | mov                 ebx, eax
            //   85db                 | test                ebx, ebx

        $sequence_6 = { 8b45f8 8b75fc 83c728 85db 75d2 8b5df0 8bbb80000000 }
            // n = 7, score = 500
            //   8b45f8               | mov                 eax, dword ptr [ebp - 8]
            //   8b75fc               | mov                 esi, dword ptr [ebp - 4]
            //   83c728               | add                 edi, 0x28
            //   85db                 | test                ebx, ebx
            //   75d2                 | jne                 0xffffffd4
            //   8b5df0               | mov                 ebx, dword ptr [ebp - 0x10]
            //   8bbb80000000         | mov                 edi, dword ptr [ebx + 0x80]

        $sequence_7 = { 03c6 8945f4 eb0e 3df232f60e 7507 }
            // n = 5, score = 500
            //   03c6                 | add                 eax, esi
            //   8945f4               | mov                 dword ptr [ebp - 0xc], eax
            //   eb0e                 | jmp                 0x10
            //   3df232f60e           | cmp                 eax, 0xef632f2
            //   7507                 | jne                 9

        $sequence_8 = { 49ffca 0fb7ca 0fb7c2 66c1e90c 6683f90a }
            // n = 5, score = 300
            //   49ffca               | dec                 ebp
            //   0fb7ca               | test                edx, edx
            //   0fb7c2               | ja                  0xc
            //   66c1e90c             | inc                 edx
            //   6683f90a             | cmp                 dword ptr [edx + ebp], 0x4550

        $sequence_9 = { eb10 6683f902 750a 25ff0f0000 6646010c00 4983c302 4d85d2 }
            // n = 7, score = 300
            //   eb10                 | cmove               eax, ebx
            //   6683f902             | dec                 eax
            //   750a                 | cmp                 dword ptr [edi], 0
            //   25ff0f0000           | dec                 eax
            //   6646010c00           | mov                 ebx, eax
            //   4983c302             | jne                 0xffffffa9
            //   4d85d2               | jmp                 0x12

        $sequence_10 = { 3d5d68fa3c 0f859e000000 4d8b5720 41beffff0000 4963423c 428b9c1088000000 468b441320 }
            // n = 7, score = 300
            //   3d5d68fa3c           | je                  0xf
            //   0f859e000000         | dec                 ecx
            //   4d8b5720             | dec                 ebp
            //   41beffff0000         | jmp                 0xffffffe8
            //   4963423c             | dec                 eax
            //   428b9c1088000000     | mov                 eax, dword ptr [0x60]
            //   468b441320           | inc                 ecx

        $sequence_11 = { 740a 4885ed 7405 4885db 750c }
            // n = 5, score = 300
            //   740a                 | je                  0xc
            //   4885ed               | dec                 eax
            //   7405                 | test                ebp, ebp
            //   4885db               | je                  7
            //   750c                 | dec                 eax

        $sequence_12 = { 7514 81e2ff0f0000 4a8b0402 498d0c01 4a890c02 eb3c }
            // n = 6, score = 300
            //   7514                 | cmp                 cx, 0xa
            //   81e2ff0f0000         | cmp                 eax, 0x3cfa685d
            //   4a8b0402             | jne                 0xa4
            //   498d0c01             | dec                 ebp
            //   4a890c02             | mov                 edx, dword ptr [edi + 0x20]
            //   eb3c                 | inc                 ecx

        $sequence_13 = { 488d4308 480f44c3 48833f00 488bd8 75a4 }
            // n = 5, score = 300
            //   488d4308             | test                ebx, ebx
            //   480f44c3             | jne                 0xe
            //   48833f00             | dec                 eax
            //   488bd8               | lea                 eax, [ebx + 8]
            //   75a4                 | dec                 eax

        $sequence_14 = { 450fb75706 4983c12c 4d85d2 7446 4d03cf 0f1f840000000000 }
            // n = 6, score = 300
            //   450fb75706           | mov                 ebx, 1
            //   4983c12c             | dec                 ecx
            //   4d85d2               | dec                 edx
            //   7446                 | movzx               ecx, dx
            //   4d03cf               | movzx               eax, dx
            //   0f1f840000000000     | shr                 cx, 0xc

        $sequence_15 = { 770a 42813c2a50450000 7405 49ffcd ebd9 65488b042560000000 41bb01000000 }
            // n = 7, score = 300
            //   770a                 | cmp                 cx, 2
            //   42813c2a50450000     | jne                 0x10
            //   7405                 | and                 eax, 0xfff
            //   49ffcd               | inc                 si
            //   ebd9                 | add                 dword ptr [eax + eax], ecx
            //   65488b042560000000     | dec    ecx
            //   41bb01000000         | add                 ebx, 2

    condition:
        7 of them and filesize < 1015808
}
Download all Yara Rules