SYMBOLCOMMON_NAMEaka. SYNONYMS
win.sedreco (Back to overview)

Sedreco

aka: azzy, eviltoss

Actor(s): APT28


There is no description at this point.

References
2020SecureworksSecureWorks
@online{secureworks:2020:iron:48c68a0, author = {SecureWorks}, title = {{IRON TWILIGHT}}, date = {2020}, organization = {Secureworks}, url = {https://www.secureworks.com/research/threat-profiles/iron-twilight}, language = {English}, urldate = {2020-05-23} } IRON TWILIGHT
X-Agent X-Agent X-Agent Computrace HideDRV Sedreco Seduploader X-Agent XTunnel Zebrocy Zebrocy (AutoIT)
2017-02-20Contagio DumpMila Parkour
@online{parkour:20170220:part:c54b5de, author = {Mila Parkour}, title = {{Part I. Russian APT - APT28 collection of samples including OSX XAgent}}, date = {2017-02-20}, organization = {Contagio Dump}, url = {https://contagiodump.blogspot.de/2017/02/russian-apt-apt28-collection-of-samples.html}, language = {English}, urldate = {2019-11-26} } Part I. Russian APT - APT28 collection of samples including OSX XAgent
X-Agent Komplex Coreshell Downdelph HideDRV SEADADDY Sedreco Seduploader X-Agent XTunnel
2017-01-10FireEyeFireEye iSIGHT Intelligence
@techreport{intelligence:20170110:apt28:2f371ee, author = {FireEye iSIGHT Intelligence}, title = {{APT28: At The Center Of The Storm}}, date = {2017-01-10}, institution = {FireEye}, url = {https://www.mandiant.com/sites/default/files/2021-09/APT28-Center-of-Storm-2017.pdf}, language = {English}, urldate = {2022-05-04} } APT28: At The Center Of The Storm
Coreshell OLDBAIT Sedreco Seduploader X-Agent
2016-10-20ESET ResearchESET Research
@techreport{research:20161020:en:e2e6603, author = {ESET Research}, title = {{En Route with Sednit Part 2: Observing the Comings and Goings}}, date = {2016-10-20}, institution = {ESET Research}, url = {http://www.welivesecurity.com/wp-content/uploads/2016/10/eset-sednit-part-2.pdf}, language = {English}, urldate = {2019-10-25} } En Route with Sednit Part 2: Observing the Comings and Goings
X-Agent Sedreco X-Agent XTunnel
2015-12-04Kaspersky LabsGReAT
@online{great:20151204:sofacy:664b5a8, author = {GReAT}, title = {{Sofacy APT hits high profile targets with updated toolset}}, date = {2015-12-04}, organization = {Kaspersky Labs}, url = {https://securelist.com/blog/research/72924/sofacy-apt-hits-high-profile-targets-with-updated-toolset/}, language = {English}, urldate = {2019-12-20} } Sofacy APT hits high profile targets with updated toolset
Sedreco
2015-12-04Kaspersky LabsGReAT
@online{great:20151204:sofacy:b437b35, author = {GReAT}, title = {{Sofacy APT hits high profile targets with updated toolset}}, date = {2015-12-04}, organization = {Kaspersky Labs}, url = {https://securelist.com/sofacy-apt-hits-high-profile-targets-with-updated-toolset/72924/}, language = {English}, urldate = {2020-08-30} } Sofacy APT hits high profile targets with updated toolset
Coreshell Sedreco Seduploader X-Agent APT28
2014-10-27Trend MicroLoucif Kharouni, Feike Hacquebord, Numaan Huq, Jim Gogolinski, Fernando Mercês, Alfred Remorin, Douglas Otis
@techreport{kharouni:20141027:operation:1b13f15, author = {Loucif Kharouni and Feike Hacquebord and Numaan Huq and Jim Gogolinski and Fernando Mercês and Alfred Remorin and Douglas Otis}, title = {{Operation Pawn Storm: Using Decoys to Evade Detection}}, date = {2014-10-27}, institution = {Trend Micro}, url = {https://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-pawn-storm.pdf}, language = {English}, urldate = {2020-09-15} } Operation Pawn Storm: Using Decoys to Evade Detection
Sedreco Seduploader APT28
2014FireEyeFireEye
@techreport{fireeye:2014:apt28:27799d1, author = {FireEye}, title = {{APT28}}, date = {2014}, institution = {FireEye}, url = {http://www2.fireeye.com/rs/fireye/images/rpt-apt28.pdf}, language = {English}, urldate = {2020-01-08} } APT28
Coreshell Sedreco X-Agent
2012-12-15R136a1
@online{r136a1:20121215:disclosure:fdfe8f2, author = {R136a1}, title = {{Disclosure of another 0day malware - Analysis of 2nd Dropper and 3rd Dropper (Part 2)}}, date = {2012-12-15}, url = {http://www.malware-reversing.com/2012/12/3-disclosure-of-another-0day-malware_15.html}, language = {English}, urldate = {2019-12-31} } Disclosure of another 0day malware - Analysis of 2nd Dropper and 3rd Dropper (Part 2)
Sedreco
Yara Rules
[TLP:WHITE] win_sedreco_auto (20230125 | Detects win.sedreco.)
rule win_sedreco_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-01-25"
        version = "1"
        description = "Detects win.sedreco."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.sedreco"
        malpedia_rule_date = "20230124"
        malpedia_hash = "2ee0eebba83dce3d019a90519f2f972c0fcf9686"
        malpedia_version = "20230125"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { c645ff30 e8???????? 85c0 7505 }
            // n = 4, score = 2600
            //   c645ff30             | mov                 byte ptr [ebp - 1], 0x30
            //   e8????????           |                     
            //   85c0                 | test                eax, eax
            //   7505                 | jne                 7

        $sequence_1 = { 51 836d0804 53 56 8b750c }
            // n = 5, score = 2600
            //   51                   | push                ecx
            //   836d0804             | sub                 dword ptr [ebp + 8], 4
            //   53                   | push                ebx
            //   56                   | push                esi
            //   8b750c               | mov                 esi, dword ptr [ebp + 0xc]

        $sequence_2 = { 55 8bec 51 836d0804 }
            // n = 4, score = 2600
            //   55                   | push                ebp
            //   8bec                 | mov                 ebp, esp
            //   51                   | push                ecx
            //   836d0804             | sub                 dword ptr [ebp + 8], 4

        $sequence_3 = { 8b750c 56 e8???????? 6a08 }
            // n = 4, score = 2600
            //   8b750c               | mov                 esi, dword ptr [ebp + 0xc]
            //   56                   | push                esi
            //   e8????????           |                     
            //   6a08                 | push                8

        $sequence_4 = { e8???????? 89450c 56 85c0 }
            // n = 4, score = 2600
            //   e8????????           |                     
            //   89450c               | mov                 dword ptr [ebp + 0xc], eax
            //   56                   | push                esi
            //   85c0                 | test                eax, eax

        $sequence_5 = { 50 68???????? 6a0d 68???????? }
            // n = 4, score = 2500
            //   50                   | push                eax
            //   68????????           |                     
            //   6a0d                 | push                0xd
            //   68????????           |                     

        $sequence_6 = { 7ce0 a1???????? 5e 85c0 }
            // n = 4, score = 2400
            //   7ce0                 | jl                  0xffffffe2
            //   a1????????           |                     
            //   5e                   | pop                 esi
            //   85c0                 | test                eax, eax

        $sequence_7 = { 7411 6a04 68???????? 68???????? e8???????? }
            // n = 5, score = 2400
            //   7411                 | je                  0x13
            //   6a04                 | push                4
            //   68????????           |                     
            //   68????????           |                     
            //   e8????????           |                     

        $sequence_8 = { 51 6802020000 68???????? 50 }
            // n = 4, score = 2400
            //   51                   | push                ecx
            //   6802020000           | push                0x202
            //   68????????           |                     
            //   50                   | push                eax

        $sequence_9 = { b8f2eeeeee 8b4df0 64890d00000000 59 5f 5e 5b }
            // n = 7, score = 2200
            //   b8f2eeeeee           | mov                 eax, 0xeeeeeef2
            //   8b4df0               | mov                 ecx, dword ptr [ebp - 0x10]
            //   64890d00000000       | mov                 dword ptr fs:[0], ecx
            //   59                   | pop                 ecx
            //   5f                   | pop                 edi
            //   5e                   | pop                 esi
            //   5b                   | pop                 ebx

        $sequence_10 = { ff15???????? 83c604 81fe???????? 7ce0 a1???????? }
            // n = 5, score = 2200
            //   ff15????????         |                     
            //   83c604               | add                 esi, 4
            //   81fe????????         |                     
            //   7ce0                 | jl                  0xffffffe2
            //   a1????????           |                     

        $sequence_11 = { be???????? 8b06 85c0 740f 50 }
            // n = 5, score = 2200
            //   be????????           |                     
            //   8b06                 | mov                 eax, dword ptr [esi]
            //   85c0                 | test                eax, eax
            //   740f                 | je                  0x11
            //   50                   | push                eax

        $sequence_12 = { 56 8b35???????? 85c0 741a 50 }
            // n = 5, score = 2200
            //   56                   | push                esi
            //   8b35????????         |                     
            //   85c0                 | test                eax, eax
            //   741a                 | je                  0x1c
            //   50                   | push                eax

        $sequence_13 = { ffd6 8b0d???????? 894124 85c0 }
            // n = 4, score = 2200
            //   ffd6                 | call                esi
            //   8b0d????????         |                     
            //   894124               | mov                 dword ptr [ecx + 0x24], eax
            //   85c0                 | test                eax, eax

        $sequence_14 = { ffd6 8b0d???????? 898198000000 85c0 }
            // n = 4, score = 2200
            //   ffd6                 | call                esi
            //   8b0d????????         |                     
            //   898198000000         | mov                 dword ptr [ecx + 0x98], eax
            //   85c0                 | test                eax, eax

        $sequence_15 = { 833d????????00 750c 833d????????00 7503 33c0 c3 }
            // n = 6, score = 1800
            //   833d????????00       |                     
            //   750c                 | jne                 0xe
            //   833d????????00       |                     
            //   7503                 | jne                 5
            //   33c0                 | xor                 eax, eax
            //   c3                   | ret                 

        $sequence_16 = { ff90a8010000 85c0 7405 e8???????? }
            // n = 4, score = 500
            //   ff90a8010000         | xor                 eax, eax
            //   85c0                 | dec                 eax
            //   7405                 | mov                 ecx, dword ptr [esp + 0x50]
            //   e8????????           |                     

        $sequence_17 = { ba10270000 488b0d???????? 488b05???????? ff5010 }
            // n = 4, score = 500
            //   ba10270000           | call                dword ptr [eax + 0x2c8]
            //   488b0d????????       |                     
            //   488b05????????       |                     
            //   ff5010               | test                eax, eax

        $sequence_18 = { 488b442450 4889442420 41b903000000 4533c0 }
            // n = 4, score = 500
            //   488b442450           | dec                 eax
            //   4889442420           | mov                 eax, dword ptr [esp + 0x50]
            //   41b903000000         | dec                 eax
            //   4533c0               | mov                 dword ptr [esp + 0x20], eax

        $sequence_19 = { c744242004000000 4533c9 4533c0 ba00000080 }
            // n = 4, score = 500
            //   c744242004000000     | inc                 ebp
            //   4533c9               | xor                 eax, eax
            //   4533c0               | mov                 edx, 0xc0000000
            //   ba00000080           | inc                 ebp

        $sequence_20 = { 68???????? e8???????? 8b35???????? 83c404 6a00 }
            // n = 5, score = 500
            //   68????????           |                     
            //   e8????????           |                     
            //   8b35????????         |                     
            //   83c404               | call                esi
            //   6a00                 | mov                 ecx, dword ptr [ebp - 4]

        $sequence_21 = { 488b4c2450 488b05???????? ff90c8020000 85c0 }
            // n = 4, score = 500
            //   488b4c2450           | inc                 ecx
            //   488b05????????       |                     
            //   ff90c8020000         | mov                 ecx, 3
            //   85c0                 | inc                 ebp

        $sequence_22 = { 6a00 68???????? 6aff 68???????? 6a00 }
            // n = 5, score = 500
            //   6a00                 | test                eax, eax
            //   68????????           |                     
            //   6aff                 | add                 esi, 4
            //   68????????           |                     
            //   6a00                 | jl                  0xffffffe2

        $sequence_23 = { 4533c0 ba000000c0 488b0d???????? 488b05???????? }
            // n = 4, score = 500
            //   4533c0               | call                dword ptr [eax + 0x1a8]
            //   ba000000c0           | test                eax, eax
            //   488b0d????????       |                     
            //   488b05????????       |                     

        $sequence_24 = { 6800010000 6a00 68???????? e8???????? 6800020000 6a00 }
            // n = 6, score = 500
            //   6800010000           | pop                 edi
            //   6a00                 | pop                 esi
            //   68????????           |                     
            //   e8????????           |                     
            //   6800020000           | add                 esp, 0xc
            //   6a00                 | mov                 eax, 0xeeeeeef7

        $sequence_25 = { 4889442420 41b906000200 4533c0 488b15???????? 48c7c101000080 488b05???????? }
            // n = 6, score = 500
            //   4889442420           | mov                 eax, 0xeeeeeef6
            //   41b906000200         | mov                 ecx, dword ptr [ebp - 0x10]
            //   4533c0               | mov                 dword ptr fs:[0], ecx
            //   488b15????????       |                     
            //   48c7c101000080       | pop                 ecx
            //   488b05????????       |                     

        $sequence_26 = { 4533c0 33d2 488bc8 488b05???????? }
            // n = 4, score = 500
            //   4533c0               | je                  9
            //   33d2                 | mov                 edx, 0x2710
            //   488bc8               | call                dword ptr [eax + 0x10]
            //   488b05????????       |                     

        $sequence_27 = { 68???????? 6a00 6a00 ffd6 8b4dfc 5f }
            // n = 6, score = 500
            //   68????????           |                     
            //   6a00                 | push                0x100
            //   6a00                 | push                0
            //   ffd6                 | push                0x200
            //   8b4dfc               | add                 esp, 4
            //   5f                   | push                0

        $sequence_28 = { ffd6 50 68???????? 6aff }
            // n = 4, score = 500
            //   ffd6                 | call                esi
            //   50                   | push                0x100
            //   68????????           |                     
            //   6aff                 | push                0

        $sequence_29 = { ffd6 8b4dfc 5f 5e 33cd b8???????? }
            // n = 6, score = 400
            //   ffd6                 | push                0
            //   8b4dfc               | call                esi
            //   5f                   | push                eax
            //   5e                   | push                -1
            //   33cd                 | push                0
            //   b8????????           |                     

        $sequence_30 = { 7cd5 68???????? e8???????? 8b4dfc }
            // n = 4, score = 400
            //   7cd5                 | push                -1
            //   68????????           |                     
            //   e8????????           |                     
            //   8b4dfc               | push                0

        $sequence_31 = { 75f9 2bcf 3bf1 7cd4 68???????? }
            // n = 5, score = 300
            //   75f9                 | jl                  0xffffffd7
            //   2bcf                 | mov                 ecx, dword ptr [ebp - 4]
            //   3bf1                 | add                 esp, 4
            //   7cd4                 | call                esi
            //   68????????           |                     

        $sequence_32 = { 68???????? e8???????? 83c40c b901000000 }
            // n = 4, score = 300
            //   68????????           |                     
            //   e8????????           |                     
            //   83c40c               | xor                 ecx, ebp
            //   b901000000           | pop                 ebx

        $sequence_33 = { 741f 6a07 68???????? e8???????? }
            // n = 4, score = 200
            //   741f                 | je                  0x21
            //   6a07                 | push                7
            //   68????????           |                     
            //   e8????????           |                     

        $sequence_34 = { 8b85e4feffff 8945f0 8b4df0 e8???????? }
            // n = 4, score = 200
            //   8b85e4feffff         | mov                 eax, dword ptr [ebp - 0x11c]
            //   8945f0               | mov                 dword ptr [ebp - 0x10], eax
            //   8b4df0               | mov                 ecx, dword ptr [ebp - 0x10]
            //   e8????????           |                     

        $sequence_35 = { 8b06 50 8b08 ff9180000000 8b06 }
            // n = 5, score = 200
            //   8b06                 | mov                 eax, dword ptr [esi]
            //   50                   | push                eax
            //   8b08                 | mov                 ecx, dword ptr [eax]
            //   ff9180000000         | call                dword ptr [ecx + 0x80]
            //   8b06                 | mov                 eax, dword ptr [esi]

        $sequence_36 = { 68???????? e8???????? 85c0 7402 eb0d 68e0930400 ff15???????? }
            // n = 7, score = 200
            //   68????????           |                     
            //   e8????????           |                     
            //   85c0                 | test                eax, eax
            //   7402                 | je                  4
            //   eb0d                 | jmp                 0xf
            //   68e0930400           | push                0x493e0
            //   ff15????????         |                     

        $sequence_37 = { 57 50 ff512c 8bce 8bd8 e8???????? 57 }
            // n = 7, score = 200
            //   57                   | push                edi
            //   50                   | push                eax
            //   ff512c               | call                dword ptr [ecx + 0x2c]
            //   8bce                 | mov                 ecx, esi
            //   8bd8                 | mov                 ebx, eax
            //   e8????????           |                     
            //   57                   | push                edi

        $sequence_38 = { 83ec24 53 56 57 c745dce197af54 0f6e45dc 0f72f002 }
            // n = 7, score = 200
            //   83ec24               | sub                 esp, 0x24
            //   53                   | push                ebx
            //   56                   | push                esi
            //   57                   | push                edi
            //   c745dce197af54       | mov                 dword ptr [ebp - 0x24], 0x54af97e1
            //   0f6e45dc             | movd                mm0, dword ptr [ebp - 0x24]
            //   0f72f002             | pslld               mm0, 2

        $sequence_39 = { 56 57 894df0 ff15???????? 8945fc }
            // n = 5, score = 200
            //   56                   | push                esi
            //   57                   | push                edi
            //   894df0               | mov                 dword ptr [ebp - 0x10], ecx
            //   ff15????????         |                     
            //   8945fc               | mov                 dword ptr [ebp - 4], eax

        $sequence_40 = { 53 56 57 c785ecfeffff01000000 c785e8feffffe197af54 0f6e85e8feffff }
            // n = 6, score = 200
            //   53                   | push                ebx
            //   56                   | push                esi
            //   57                   | push                edi
            //   c785ecfeffff01000000     | mov    dword ptr [ebp - 0x114], 1
            //   c785e8feffffe197af54     | mov    dword ptr [ebp - 0x118], 0x54af97e1
            //   0f6e85e8feffff       | movd                mm0, dword ptr [ebp - 0x118]

        $sequence_41 = { a1???????? 8d4c241c 8d54242c 51 52 56 }
            // n = 6, score = 100
            //   a1????????           |                     
            //   8d4c241c             | push                ebx
            //   8d54242c             | mov                 dword ptr [esp + 0x14], ebx
            //   51                   | mov                 cl, byte ptr [esp + 0x13]
            //   52                   | mov                 byte ptr [esp + 0x28], cl
            //   56                   | lea                 ecx, [esp + 0x28]

        $sequence_42 = { ff15???????? 8b15???????? 8d4d98 8b02 50 6a00 }
            // n = 6, score = 100
            //   ff15????????         |                     
            //   8b15????????         |                     
            //   8d4d98               | mov                 cl, byte ptr [ebp - 0x68]
            //   8b02                 | sub                 esp, 0x10
            //   50                   | mov                 esi, esp
            //   6a00                 | mov                 dword ptr [ebp - 0x24], esp

        $sequence_43 = { 83f801 7706 ff15???????? 8b4c2424 6a00 8d7901 }
            // n = 6, score = 100
            //   83f801               | xor                 ebp, ebp
            //   7706                 | mov                 esi, dword ptr [esp + 0x3c]
            //   ff15????????         |                     
            //   8b4c2424             | mov                 dl, byte ptr [esp + 0x1c]
            //   6a00                 | mov                 byte ptr [esi], dl
            //   8d7901               | mov                 dword ptr [esi + 4], ebp

        $sequence_44 = { 8b54242c 0fbec3 03d1 8ae0 8802 8b542428 }
            // n = 6, score = 100
            //   8b54242c             | push                0
            //   0fbec3               | dec                 edi
            //   03d1                 | jne                 0xffffffb6
            //   8ae0                 | xor                 ebp, ebp
            //   8802                 | mov                 esi, dword ptr [esp + 0x3c]
            //   8b542428             | mov                 dl, byte ptr [esp + 0x1c]

        $sequence_45 = { 4f 75b3 33ed 8b74243c 8a54241c }
            // n = 5, score = 100
            //   4f                   | pop                 ecx
            //   75b3                 | pop                 edi
            //   33ed                 | test                eax, eax
            //   8b74243c             | jne                 7
            //   8a54241c             | pop                 ebx

        $sequence_46 = { ff15???????? 53 895c2414 8a4c2413 884c2428 8d4c2428 }
            // n = 6, score = 100
            //   ff15????????         |                     
            //   53                   | mov                 edx, dword ptr [esp + 0x28]
            //   895c2414             | mov                 dword ptr [esp + 0x2c], esi
            //   8a4c2413             | mov                 byte ptr [edx + esi], 0
            //   884c2428             | inc                 edi
            //   8d4c2428             | mov                 byte ptr [ebp - 4], 6

        $sequence_47 = { 8b542428 8974242c c6043200 47 }
            // n = 4, score = 100
            //   8b542428             | mov                 eax, 0xeeeeeef6
            //   8974242c             | mov                 ecx, dword ptr [ebp - 0x10]
            //   c6043200             | mov                 dword ptr fs:[0], ecx
            //   47                   | pop                 ecx

        $sequence_48 = { c645fc06 ff15???????? 8a4d98 83ec10 8bf4 8965dc 6a00 }
            // n = 7, score = 100
            //   c645fc06             | pop                 edi
            //   ff15????????         |                     
            //   8a4d98               | pop                 esi
            //   83ec10               | add                 esp, 0xc
            //   8bf4                 | mov                 eax, 1
            //   8965dc               | mov                 ecx, dword ptr [ebp - 0x10]
            //   6a00                 | mov                 dword ptr fs:[0], ecx

    condition:
        7 of them and filesize < 1586176
}
Download all Yara Rules