SYMBOLCOMMON_NAMEaka. SYNONYMS
win.sharpknot (Back to overview)

SHARPKNOT

aka: Bitrep

Actor(s): Silent Chollima


There is no description at this point.

References
2018-03-09NCCICNCCIC
@techreport{nccic:20180309:malware:191ad79, author = {NCCIC}, title = {{Malware Analysis Report Sharpknot}}, date = {2018-03-09}, institution = {NCCIC}, url = {https://www.us-cert.gov/sites/default/files/publications/MAR-10135536.11.WHITE.pdf}, language = {English}, urldate = {2019-11-25} } Malware Analysis Report Sharpknot
SHARPKNOT
2013-04-02Eric Romang
@online{romang:20130402:dark:20ae252, author = {Eric Romang}, title = {{Dark South Korea Total War Review}}, date = {2013-04-02}, url = {https://eromang.zataz.com/tag/agentbase-exe/}, language = {English}, urldate = {2019-11-21} } Dark South Korea Total War Review
SHARPKNOT
Yara Rules
[TLP:WHITE] win_sharpknot_auto (20201023 | autogenerated rule brought to you by yara-signator)
rule win_sharpknot_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-12-22"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.sharpknot"
        malpedia_rule_date = "20201222"
        malpedia_hash = "30354d830a29f0fbd3714d93d94dea941d77a130"
        malpedia_version = "20201023"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { f3a4 e8???????? 83c408 85c0 7436 c6400100 }
            // n = 6, score = 100
            //   f3a4                 | rep movsb           byte ptr es:[edi], byte ptr [esi]
            //   e8????????           |                     
            //   83c408               | add                 esp, 8
            //   85c0                 | test                eax, eax
            //   7436                 | je                  0x38
            //   c6400100             | mov                 byte ptr [eax + 1], 0

        $sequence_1 = { 747a 8b842460040000 8d54243c 52 }
            // n = 4, score = 100
            //   747a                 | je                  0x7c
            //   8b842460040000       | mov                 eax, dword ptr [esp + 0x460]
            //   8d54243c             | lea                 edx, [esp + 0x3c]
            //   52                   | push                edx

        $sequence_2 = { 8d4c2428 6a14 51 56 ff15???????? 85c0 }
            // n = 6, score = 100
            //   8d4c2428             | lea                 ecx, [esp + 0x28]
            //   6a14                 | push                0x14
            //   51                   | push                ecx
            //   56                   | push                esi
            //   ff15????????         |                     
            //   85c0                 | test                eax, eax

        $sequence_3 = { 85c0 0f85ebfeffff 55 ff15???????? }
            // n = 4, score = 100
            //   85c0                 | test                eax, eax
            //   0f85ebfeffff         | jne                 0xfffffef1
            //   55                   | push                ebp
            //   ff15????????         |                     

        $sequence_4 = { 8a80acb14000 83e00f eb02 33c0 0fbe84c6ccb14000 c1f804 }
            // n = 6, score = 100
            //   8a80acb14000         | mov                 al, byte ptr [eax + 0x40b1ac]
            //   83e00f               | and                 eax, 0xf
            //   eb02                 | jmp                 4
            //   33c0                 | xor                 eax, eax
            //   0fbe84c6ccb14000     | movsx               eax, byte ptr [esi + eax*8 + 0x40b1cc]
            //   c1f804               | sar                 eax, 4

        $sequence_5 = { 8a4001 3c65 7438 3c6d 7573 8d8c2424020000 }
            // n = 6, score = 100
            //   8a4001               | mov                 al, byte ptr [eax + 1]
            //   3c65                 | cmp                 al, 0x65
            //   7438                 | je                  0x3a
            //   3c6d                 | cmp                 al, 0x6d
            //   7573                 | jne                 0x75
            //   8d8c2424020000       | lea                 ecx, [esp + 0x224]

        $sequence_6 = { 7405 83c60a ebe8 bb01000000 85db 7522 be???????? }
            // n = 7, score = 100
            //   7405                 | je                  7
            //   83c60a               | add                 esi, 0xa
            //   ebe8                 | jmp                 0xffffffea
            //   bb01000000           | mov                 ebx, 1
            //   85db                 | test                ebx, ebx
            //   7522                 | jne                 0x24
            //   be????????           |                     

        $sequence_7 = { 0f84e9000000 8b7508 8b7d0c 8d0568e44400 }
            // n = 4, score = 100
            //   0f84e9000000         | je                  0xef
            //   8b7508               | mov                 esi, dword ptr [ebp + 8]
            //   8b7d0c               | mov                 edi, dword ptr [ebp + 0xc]
            //   8d0568e44400         | lea                 eax, [0x44e468]

        $sequence_8 = { 50 57 ff15???????? 8b1d???????? 8d4c243c }
            // n = 5, score = 100
            //   50                   | push                eax
            //   57                   | push                edi
            //   ff15????????         |                     
            //   8b1d????????         |                     
            //   8d4c243c             | lea                 ecx, [esp + 0x3c]

        $sequence_9 = { 56 57 33f6 8d7d08 6804010000 }
            // n = 5, score = 100
            //   56                   | push                esi
            //   57                   | push                edi
            //   33f6                 | xor                 esi, esi
            //   8d7d08               | lea                 edi, [ebp + 8]
            //   6804010000           | push                0x104

    condition:
        7 of them and filesize < 1032192
}
[TLP:WHITE] win_sharpknot_w0   (20180413 | No description)
rule win_sharpknot_w0 {
    meta:
        author = "NCCIC Partner"
        source = "NCCIC Partner"
        date = "2017-12-12"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.sharpknot"
        malpedia_version = "20180413"
        malpedia_sharing = "TLP:WHITE"
        malpedia_license = ""
    strings:
        $mbr_code = { 33 C0 8E D0 BC 00 7C FB 50 07 50 1F FC BE 5D 7C 33 C9 41 81 F9 00 ?? 74 24 B4 43 B0 00 CD 13 FE C2 80 FA 84 7C F3 B2 80 BF 65 7C 81 05 00 04 83 55 02 00 83 55 04 00 83 55 06 00 EB D5 BE 4D 7C B4 43 B0 00 CD 13 33 C9 BE 5D 7C EB C5 }
        $controlServiceFoundlnBoth = { 83 EC 1C 57 68 3F 00 0F 00 6A 00 6A 00 FF 15 ?? ?? ?? ?? 8B F8 85 FF 74 44 8B 44 24 24 53 56 6A 24 50 57 FF 15 ?? ?? ?? ?? 8B 1D ?? ?? ?? ?? 8B F0 85 F6 74 1C 8D 4C 24 0C 51 6A 01 56 FF 15 ?? ?? ?? ?? 68 E8 03 00 00 FF 15 ?? ?? ?? ?? 56 FF D3 57 FF D3 5E 5B 33 C0 5F 83 C4 1C C3 33 C0 5F 83 C4 1C C3 }
    condition:
    any of them
}
Download all Yara Rules