SYMBOLCOMMON_NAMEaka. SYNONYMS
win.sedreco (Back to overview)

Sedreco

aka: azzy, eviltoss

Actor(s): Sofacy


There is no description at this point.

References
2020SecureworksSecureWorks
@online{secureworks:2020:iron:48c68a0, author = {SecureWorks}, title = {{IRON TWILIGHT}}, date = {2020}, organization = {Secureworks}, url = {https://www.secureworks.com/research/threat-profiles/iron-twilight}, language = {English}, urldate = {2020-05-23} } IRON TWILIGHT
X-Agent X-Agent X-Agent Computrace HideDRV Sedreco Seduploader X-Agent XTunnel Zebrocy Zebrocy (AutoIT)
2017-02-20Contagio DumpMila Parkour
@online{parkour:20170220:part:c54b5de, author = {Mila Parkour}, title = {{Part I. Russian APT - APT28 collection of samples including OSX XAgent}}, date = {2017-02-20}, organization = {Contagio Dump}, url = {https://contagiodump.blogspot.de/2017/02/russian-apt-apt28-collection-of-samples.html}, language = {English}, urldate = {2019-11-26} } Part I. Russian APT - APT28 collection of samples including OSX XAgent
X-Agent Komplex Coreshell Downdelph HideDRV SEADADDY Sedreco Seduploader X-Agent XTunnel
2017-01-10FireEyeFireEye iSIGHT Intelligence
@techreport{intelligence:20170110:apt28:2f371ee, author = {FireEye iSIGHT Intelligence}, title = {{APT28: At The Center Of The Storm}}, date = {2017-01-10}, institution = {FireEye}, url = {https://www.mandiant.com/sites/default/files/2021-09/APT28-Center-of-Storm-2017.pdf}, language = {English}, urldate = {2022-05-04} } APT28: At The Center Of The Storm
Coreshell OLDBAIT Sedreco Seduploader X-Agent
2016-10-20ESET ResearchESET Research
@techreport{research:20161020:en:e2e6603, author = {ESET Research}, title = {{En Route with Sednit Part 2: Observing the Comings and Goings}}, date = {2016-10-20}, institution = {ESET Research}, url = {http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf}, language = {English}, urldate = {2019-10-25} } En Route with Sednit Part 2: Observing the Comings and Goings
X-Agent Sedreco X-Agent XTunnel
2015-12-04Kaspersky LabsGReAT
@online{great:20151204:sofacy:664b5a8, author = {GReAT}, title = {{Sofacy APT hits high profile targets with updated toolset}}, date = {2015-12-04}, organization = {Kaspersky Labs}, url = {https://securelist.com/blog/research/72924/sofacy-apt-hits-high-profile-targets-with-updated-toolset/}, language = {English}, urldate = {2019-12-20} } Sofacy APT hits high profile targets with updated toolset
Sedreco
2015-12-04Kaspersky LabsGReAT
@online{great:20151204:sofacy:b437b35, author = {GReAT}, title = {{Sofacy APT hits high profile targets with updated toolset}}, date = {2015-12-04}, organization = {Kaspersky Labs}, url = {https://securelist.com/sofacy-apt-hits-high-profile-targets-with-updated-toolset/72924/}, language = {English}, urldate = {2020-08-30} } Sofacy APT hits high profile targets with updated toolset
Coreshell Sedreco Seduploader X-Agent Sofacy
2014-10-27Trend MicroLoucif Kharouni, Feike Hacquebord, Numaan Huq, Jim Gogolinski, Fernando Mercês, Alfred Remorin, Douglas Otis
@techreport{kharouni:20141027:operation:1b13f15, author = {Loucif Kharouni and Feike Hacquebord and Numaan Huq and Jim Gogolinski and Fernando Mercês and Alfred Remorin and Douglas Otis}, title = {{Operation Pawn Storm: Using Decoys to Evade Detection}}, date = {2014-10-27}, institution = {Trend Micro}, url = {https://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-pawn-storm.pdf}, language = {English}, urldate = {2020-09-15} } Operation Pawn Storm: Using Decoys to Evade Detection
Sedreco Seduploader Sofacy
2014FireEyeFireEye
@techreport{fireeye:2014:apt28:27799d1, author = {FireEye}, title = {{APT28}}, date = {2014}, institution = {FireEye}, url = {http://www2.fireeye.com/rs/fireye/images/rpt-apt28.pdf}, language = {English}, urldate = {2020-01-08} } APT28
Coreshell Sedreco X-Agent
2012-12-15R136a1
@online{r136a1:20121215:disclosure:fdfe8f2, author = {R136a1}, title = {{Disclosure of another 0day malware - Analysis of 2nd Dropper and 3rd Dropper (Part 2)}}, date = {2012-12-15}, url = {http://www.malware-reversing.com/2012/12/3-disclosure-of-another-0day-malware_15.html}, language = {English}, urldate = {2019-12-31} } Disclosure of another 0day malware - Analysis of 2nd Dropper and 3rd Dropper (Part 2)
Sedreco
Yara Rules
[TLP:WHITE] win_sedreco_auto (20220411 | Detects win.sedreco.)
rule win_sedreco_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-04-08"
        version = "1"
        description = "Detects win.sedreco."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.sedreco"
        malpedia_rule_date = "20220405"
        malpedia_hash = "ecd38294bd47d5589be5cd5490dc8bb4804afc2a"
        malpedia_version = "20220411"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 8b750c 56 e8???????? 6a08 }
            // n = 4, score = 2600
            //   8b750c               | mov                 esi, dword ptr [ebp + 0xc]
            //   56                   | push                esi
            //   e8????????           |                     
            //   6a08                 | push                8

        $sequence_1 = { c645ff30 e8???????? 85c0 7505 e8???????? }
            // n = 5, score = 2600
            //   c645ff30             | mov                 byte ptr [ebp - 1], 0x30
            //   e8????????           |                     
            //   85c0                 | test                eax, eax
            //   7505                 | jne                 7
            //   e8????????           |                     

        $sequence_2 = { e8???????? 89450c 56 85c0 }
            // n = 4, score = 2600
            //   e8????????           |                     
            //   89450c               | mov                 dword ptr [ebp + 0xc], eax
            //   56                   | push                esi
            //   85c0                 | test                eax, eax

        $sequence_3 = { 8bec 51 836d0804 53 56 }
            // n = 5, score = 2600
            //   8bec                 | mov                 ebp, esp
            //   51                   | push                ecx
            //   836d0804             | sub                 dword ptr [ebp + 8], 4
            //   53                   | push                ebx
            //   56                   | push                esi

        $sequence_4 = { 50 68???????? 6a0d 68???????? }
            // n = 4, score = 2500
            //   50                   | push                eax
            //   68????????           |                     
            //   6a0d                 | push                0xd
            //   68????????           |                     

        $sequence_5 = { 7411 6a04 68???????? 68???????? }
            // n = 4, score = 2400
            //   7411                 | je                  0x13
            //   6a04                 | push                4
            //   68????????           |                     
            //   68????????           |                     

        $sequence_6 = { 51 6802020000 68???????? 50 }
            // n = 4, score = 2400
            //   51                   | push                ecx
            //   6802020000           | push                0x202
            //   68????????           |                     
            //   50                   | push                eax

        $sequence_7 = { 7ce0 a1???????? 5e 85c0 }
            // n = 4, score = 2400
            //   7ce0                 | jl                  0xffffffe2
            //   a1????????           |                     
            //   5e                   | pop                 esi
            //   85c0                 | test                eax, eax

        $sequence_8 = { ffd6 8b0d???????? 894108 85c0 }
            // n = 4, score = 2200
            //   ffd6                 | call                esi
            //   8b0d????????         |                     
            //   894108               | mov                 dword ptr [ecx + 8], eax
            //   85c0                 | test                eax, eax

        $sequence_9 = { ff15???????? 83c604 81fe???????? 7ce0 a1???????? }
            // n = 5, score = 2200
            //   ff15????????         |                     
            //   83c604               | add                 esi, 4
            //   81fe????????         |                     
            //   7ce0                 | jl                  0xffffffe2
            //   a1????????           |                     

        $sequence_10 = { ffd6 8b0d???????? 8981e4000000 85c0 }
            // n = 4, score = 2200
            //   ffd6                 | call                esi
            //   8b0d????????         |                     
            //   8981e4000000         | mov                 dword ptr [ecx + 0xe4], eax
            //   85c0                 | test                eax, eax

        $sequence_11 = { e8???????? 83c40c b801000000 8b4df0 64890d00000000 59 5f }
            // n = 7, score = 2200
            //   e8????????           |                     
            //   83c40c               | add                 esp, 0xc
            //   b801000000           | mov                 eax, 1
            //   8b4df0               | mov                 ecx, dword ptr [ebp - 0x10]
            //   64890d00000000       | mov                 dword ptr fs:[0], ecx
            //   59                   | pop                 ecx
            //   5f                   | pop                 edi

        $sequence_12 = { 56 be???????? 8b06 85c0 740f 50 }
            // n = 6, score = 2200
            //   56                   | push                esi
            //   be????????           |                     
            //   8b06                 | mov                 eax, dword ptr [esi]
            //   85c0                 | test                eax, eax
            //   740f                 | je                  0x11
            //   50                   | push                eax

        $sequence_13 = { ff15???????? 8906 8bf0 85f6 }
            // n = 4, score = 1900
            //   ff15????????         |                     
            //   8906                 | mov                 dword ptr [esi], eax
            //   8bf0                 | mov                 esi, eax
            //   85f6                 | test                esi, esi

        $sequence_14 = { 50 68???????? 6aff 68???????? 6a00 6a00 ffd6 }
            // n = 7, score = 500
            //   50                   | mov                 dword ptr [ebp + 0xc], eax
            //   68????????           |                     
            //   6aff                 | push                esi
            //   68????????           |                     
            //   6a00                 | test                eax, eax
            //   6a00                 | push                ebp
            //   ffd6                 | mov                 ebp, esp

        $sequence_15 = { ff90e8000000 488b0d???????? 488b05???????? ff5028 }
            // n = 4, score = 500
            //   ff90e8000000         | inc                 ebp
            //   488b0d????????       |                     
            //   488b05????????       |                     
            //   ff5028               | xor                 eax, eax

        $sequence_16 = { ffd6 50 68???????? 6aff }
            // n = 4, score = 500
            //   ffd6                 | push                ebp
            //   50                   | mov                 ebp, esp
            //   68????????           |                     
            //   6aff                 | push                ecx

        $sequence_17 = { 6800010000 6a00 68???????? e8???????? 6800020000 6a00 }
            // n = 6, score = 500
            //   6800010000           | push                eax
            //   6a00                 | jl                  0xffffffe2
            //   68????????           |                     
            //   e8????????           |                     
            //   6800020000           | pop                 esi
            //   6a00                 | test                eax, eax

        $sequence_18 = { ff90e0000000 488b0d???????? 488b05???????? ff90a8010000 }
            // n = 4, score = 500
            //   ff90e0000000         | ret                 
            //   488b0d????????       |                     
            //   488b05????????       |                     
            //   ff90a8010000         | dec                 eax

        $sequence_19 = { eb04 4883c010 4883c428 c3 48890d???????? c3 48895c2410 }
            // n = 7, score = 500
            //   eb04                 | dec                 eax
            //   4883c010             | mov                 dword ptr [esp + 0x20], eax
            //   4883c428             | inc                 ecx
            //   c3                   | mov                 ecx, 3
            //   48890d????????       |                     
            //   c3                   | inc                 ebp
            //   48895c2410           | xor                 eax, eax

        $sequence_20 = { 68???????? e8???????? 8b35???????? 83c404 6a00 }
            // n = 5, score = 500
            //   68????????           |                     
            //   e8????????           |                     
            //   8b35????????         |                     
            //   83c404               | sub                 dword ptr [ebp + 8], 4
            //   6a00                 | push                ebx

        $sequence_21 = { 8b35???????? 83c404 6a00 68???????? 6aff 68???????? }
            // n = 6, score = 500
            //   8b35????????         |                     
            //   83c404               | push                ecx
            //   6a00                 | sub                 dword ptr [ebp + 8], 4
            //   68????????           |                     
            //   6aff                 | mov                 ebp, esp
            //   68????????           |                     

        $sequence_22 = { 33d2 33c9 488b05???????? ff90f0000000 }
            // n = 4, score = 500
            //   33d2                 | dec                 eax
            //   33c9                 | mov                 ecx, 0x80000001
            //   488b05????????       |                     
            //   ff90f0000000         | call                dword ptr [eax + 0x138]

        $sequence_23 = { ff90e8000000 ba10270000 488b0d???????? 488b05???????? ff5010 85c0 }
            // n = 6, score = 500
            //   ff90e8000000         | xor                 edx, edx
            //   ba10270000           | xor                 ecx, ecx
            //   488b0d????????       |                     
            //   488b05????????       |                     
            //   ff5010               | call                dword ptr [eax + 0xf0]
            //   85c0                 | call                dword ptr [eax + 0xe8]

        $sequence_24 = { 4533c0 ba00000080 488b0d???????? 488b05???????? ff5040 }
            // n = 5, score = 500
            //   4533c0               | mov                 edx, 0x2710
            //   ba00000080           | call                dword ptr [eax + 0x10]
            //   488b0d????????       |                     
            //   488b05????????       |                     
            //   ff5040               | test                eax, eax

        $sequence_25 = { 89442428 488b442450 4889442420 41b903000000 4533c0 488b15???????? }
            // n = 6, score = 500
            //   89442428             | call                dword ptr [eax + 0x28]
            //   488b442450           | inc                 ebp
            //   4889442420           | xor                 ecx, ecx
            //   41b903000000         | inc                 ebp
            //   4533c0               | xor                 eax, eax
            //   488b15????????       |                     

        $sequence_26 = { 41b906000200 4533c0 488b15???????? 48c7c101000080 488b05???????? ff9038010000 }
            // n = 6, score = 500
            //   41b906000200         | inc                 ecx
            //   4533c0               | mov                 ecx, 0x20006
            //   488b15????????       |                     
            //   48c7c101000080       | inc                 ebp
            //   488b05????????       |                     
            //   ff9038010000         | xor                 eax, eax

        $sequence_27 = { ffd6 8b4dfc 5f 5e 33cd b8???????? 5b }
            // n = 7, score = 400
            //   ffd6                 | push                0
            //   8b4dfc               | push                -1
            //   5f                   | add                 esp, 4
            //   5e                   | push                0
            //   33cd                 | push                -1
            //   b8????????           |                     
            //   5b                   | push                0

        $sequence_28 = { 7cd5 68???????? e8???????? 8b4dfc }
            // n = 4, score = 400
            //   7cd5                 | push                0
            //   68????????           |                     
            //   e8????????           |                     
            //   8b4dfc               | push                0

        $sequence_29 = { b930000000 e8???????? 50 ffd7 a3???????? 85c0 }
            // n = 6, score = 300
            //   b930000000           | pop                 edi
            //   e8????????           |                     
            //   50                   | push                -1
            //   ffd7                 | push                0
            //   a3????????           |                     
            //   85c0                 | push                0

        $sequence_30 = { 6a01 68???????? 68???????? 8d45f8 50 }
            // n = 5, score = 300
            //   6a01                 | pop                 edi
            //   68????????           |                     
            //   68????????           |                     
            //   8d45f8               | push                0
            //   50                   | push                0

        $sequence_31 = { 53 56 57 c785ecfeffff01000000 c785e8feffffe197af54 }
            // n = 5, score = 200
            //   53                   | push                ebx
            //   56                   | push                esi
            //   57                   | push                edi
            //   c785ecfeffff01000000     | mov    dword ptr [ebp - 0x114], 1
            //   c785e8feffffe197af54     | mov    dword ptr [ebp - 0x118], 0x54af97e1

        $sequence_32 = { 50 8b08 ff9180000000 8b06 }
            // n = 4, score = 200
            //   50                   | push                eax
            //   8b08                 | mov                 ecx, dword ptr [eax]
            //   ff9180000000         | call                dword ptr [ecx + 0x80]
            //   8b06                 | mov                 eax, dword ptr [esi]

        $sequence_33 = { 894df0 ff15???????? 8945fc 8b45f0 8945f4 8b45f4 }
            // n = 6, score = 200
            //   894df0               | mov                 dword ptr [ebp - 0x10], ecx
            //   ff15????????         |                     
            //   8945fc               | mov                 dword ptr [ebp - 4], eax
            //   8b45f0               | mov                 eax, dword ptr [ebp - 0x10]
            //   8945f4               | mov                 dword ptr [ebp - 0xc], eax
            //   8b45f4               | mov                 eax, dword ptr [ebp - 0xc]

        $sequence_34 = { c785ecfeffff01000000 c785e8feffffe197af54 0f6e85e8feffff 0f72f002 }
            // n = 4, score = 200
            //   c785ecfeffff01000000     | mov    dword ptr [ebp - 0x114], 1
            //   c785e8feffffe197af54     | mov    dword ptr [ebp - 0x118], 0x54af97e1
            //   0f6e85e8feffff       | movd                mm0, dword ptr [ebp - 0x118]
            //   0f72f002             | pslld               mm0, 2

        $sequence_35 = { 8b85ecfeffff 8b4df4 64890d00000000 5f 5e 5b }
            // n = 6, score = 200
            //   8b85ecfeffff         | mov                 eax, dword ptr [ebp - 0x114]
            //   8b4df4               | mov                 ecx, dword ptr [ebp - 0xc]
            //   64890d00000000       | mov                 dword ptr fs:[0], ecx
            //   5f                   | pop                 edi
            //   5e                   | pop                 esi
            //   5b                   | pop                 ebx

        $sequence_36 = { 56 57 c745dce197af54 0f6e45dc }
            // n = 4, score = 200
            //   56                   | push                esi
            //   57                   | push                edi
            //   c745dce197af54       | mov                 dword ptr [ebp - 0x24], 0x54af97e1
            //   0f6e45dc             | movd                mm0, dword ptr [ebp - 0x24]

        $sequence_37 = { 741f 6a07 68???????? e8???????? 85c0 7402 eb0d }
            // n = 7, score = 200
            //   741f                 | je                  0x21
            //   6a07                 | push                7
            //   68????????           |                     
            //   e8????????           |                     
            //   85c0                 | test                eax, eax
            //   7402                 | je                  4
            //   eb0d                 | jmp                 0xf

        $sequence_38 = { 52 57 50 ff512c 8bce 8bd8 e8???????? }
            // n = 7, score = 200
            //   52                   | push                edx
            //   57                   | push                edi
            //   50                   | push                eax
            //   ff512c               | call                dword ptr [ecx + 0x2c]
            //   8bce                 | mov                 ecx, esi
            //   8bd8                 | mov                 ebx, eax
            //   e8????????           |                     

        $sequence_39 = { 8b5608 c706???????? 52 ff15???????? 56 }
            // n = 5, score = 100
            //   8b5608               | mov                 edx, 0xc0000000
            //   c706????????         |                     
            //   52                   | call                dword ptr [eax + 0x40]
            //   ff15????????         |                     
            //   56                   | dec                 eax

        $sequence_40 = { ff15???????? 8b75e8 e8???????? 6a00 6a00 6a00 6a00 }
            // n = 7, score = 100
            //   ff15????????         |                     
            //   8b75e8               | call                dword ptr [eax + 0x1a8]
            //   e8????????           |                     
            //   6a00                 | call                dword ptr [eax + 0xe8]
            //   6a00                 | call                dword ptr [eax + 0xe8]
            //   6a00                 | mov                 edx, 0x2710
            //   6a00                 | inc                 ebp

        $sequence_41 = { 8b4c2420 3bce 66ab 741c 8a41ff 84c0 740b }
            // n = 7, score = 100
            //   8b4c2420             | mov                 ecx, 0x20006
            //   3bce                 | inc                 ebp
            //   66ab                 | xor                 eax, eax
            //   741c                 | dec                 eax
            //   8a41ff               | mov                 ecx, 0x80000001
            //   84c0                 | call                dword ptr [eax + 0x138]
            //   740b                 | call                dword ptr [eax + 0xe0]

        $sequence_42 = { c6043900 8b442440 45 3be8 7c8e 83fe03 7d54 }
            // n = 7, score = 100
            //   c6043900             | add                 eax, 0x10
            //   8b442440             | dec                 eax
            //   45                   | add                 esp, 0x28
            //   3be8                 | ret                 
            //   7c8e                 | ret                 
            //   83fe03               | dec                 eax
            //   7d54                 | mov                 dword ptr [esp + 0x10], ebx

        $sequence_43 = { 51 52 8944242c 53 c74424280c000000 8944242c c744243001000000 }
            // n = 7, score = 100
            //   51                   | call                dword ptr [eax + 0xe8]
            //   52                   | mov                 edx, 0x2710
            //   8944242c             | call                dword ptr [eax + 0x10]
            //   53                   | dec                 eax
            //   c74424280c000000     | add                 esp, 0x28
            //   8944242c             | ret                 
            //   c744243001000000     | ret                 

        $sequence_44 = { 8b54242c 8a5c3c14 8b08 2bca 83f901 7706 }
            // n = 6, score = 100
            //   8b54242c             | mov                 dword ptr [esp + 0x18], esi
            //   8a5c3c14             | push                ebp
            //   8b08                 | inc                 ebp
            //   2bca                 | xor                 ecx, ecx
            //   83f901               | inc                 ebp
            //   7706                 | xor                 eax, eax

        $sequence_45 = { 8806 895e04 895e08 895e0c 68???????? 895c2420 }
            // n = 6, score = 100
            //   8806                 | dec                 eax
            //   895e04               | mov                 dword ptr [esp + 0x18], esi
            //   895e08               | dec                 eax
            //   895e0c               | mov                 dword ptr [esp + 0x20], eax
            //   68????????           |                     
            //   895c2420             | inc                 ecx

        $sequence_46 = { 6a00 8d4da8 8845a8 ff15???????? }
            // n = 4, score = 100
            //   6a00                 | dec                 eax
            //   8d4da8               | mov                 dword ptr [esp + 0x10], ebx
            //   8845a8               | dec                 eax
            //   ff15????????         |                     

    condition:
        7 of them and filesize < 1586176
}
Download all Yara Rules