SYMBOLCOMMON_NAMEaka. SYNONYMS
win.slothfulmedia (Back to overview)

SlothfulMedia

aka: QueenOfClubs

Actor(s): PowerPool


There is no description at this point.

References
2020-10-15Kaspersky LabsIvan Kwiatkowski, Pierre Delcher, Félix Aime
@online{kwiatkowski:20201015:iamtheking:1c3917e, author = {Ivan Kwiatkowski and Pierre Delcher and Félix Aime}, title = {{IAmTheKing and the SlothfulMedia malware family}}, date = {2020-10-15}, organization = {Kaspersky Labs}, url = {https://securelist.com/iamtheking-and-the-slothfulmedia-malware-family/99000/}, language = {English}, urldate = {2020-10-16} } IAmTheKing and the SlothfulMedia malware family
SlothfulMedia
2020-10-01US-CERTUS-CERT
@online{uscert:20201001:malware:819220c, author = {US-CERT}, title = {{Malware Analysis Report (AR20-275A): Remote Access Trojan: SLOTHFULMEDIA}}, date = {2020-10-01}, organization = {US-CERT}, url = {https://us-cert.cisa.gov/ncas/analysis-reports/ar20-275a}, language = {English}, urldate = {2020-10-04} } Malware Analysis Report (AR20-275A): Remote Access Trojan: SLOTHFULMEDIA
SlothfulMedia
Yara Rules
[TLP:WHITE] win_slothfulmedia_auto (20220411 | Detects win.slothfulmedia.)
rule win_slothfulmedia_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-04-08"
        version = "1"
        description = "Detects win.slothfulmedia."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.slothfulmedia"
        malpedia_rule_date = "20220405"
        malpedia_hash = "ecd38294bd47d5589be5cd5490dc8bb4804afc2a"
        malpedia_version = "20220411"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { c6833802000001 e9???????? 53 e8???????? e9???????? 5f }
            // n = 6, score = 200
            //   c6833802000001       | mov                 byte ptr [ebx + 0x238], 1
            //   e9????????           |                     
            //   53                   | push                ebx
            //   e8????????           |                     
            //   e9????????           |                     
            //   5f                   | pop                 edi

        $sequence_1 = { 6805400080 e8???????? 8b75f0 6bf64c 037510 8d7dd0 }
            // n = 6, score = 200
            //   6805400080           | push                0x80004005
            //   e8????????           |                     
            //   8b75f0               | mov                 esi, dword ptr [ebp - 0x10]
            //   6bf64c               | imul                esi, esi, 0x4c
            //   037510               | add                 esi, dword ptr [ebp + 0x10]
            //   8d7dd0               | lea                 edi, dword ptr [ebp - 0x30]

        $sequence_2 = { ff15???????? 6a04 ff15???????? 8b8e5c040000 8b8970010000 6a01 6a04 }
            // n = 7, score = 200
            //   ff15????????         |                     
            //   6a04                 | push                4
            //   ff15????????         |                     
            //   8b8e5c040000         | mov                 ecx, dword ptr [esi + 0x45c]
            //   8b8970010000         | mov                 ecx, dword ptr [ecx + 0x170]
            //   6a01                 | push                1
            //   6a04                 | push                4

        $sequence_3 = { 8b450c 83c0fc 50 8d85a0fdffff 53 }
            // n = 5, score = 200
            //   8b450c               | mov                 eax, dword ptr [ebp + 0xc]
            //   83c0fc               | add                 eax, -4
            //   50                   | push                eax
            //   8d85a0fdffff         | lea                 eax, dword ptr [ebp - 0x260]
            //   53                   | push                ebx

        $sequence_4 = { 33ff 83c0ec 8bf1 8945fc 745a 53 8b45fc }
            // n = 7, score = 200
            //   33ff                 | xor                 edi, edi
            //   83c0ec               | add                 eax, -0x14
            //   8bf1                 | mov                 esi, ecx
            //   8945fc               | mov                 dword ptr [ebp - 4], eax
            //   745a                 | je                  0x5c
            //   53                   | push                ebx
            //   8b45fc               | mov                 eax, dword ptr [ebp - 4]

        $sequence_5 = { 899ef4040000 ff15???????? 8bf8 83ffff 744f 53 8d45fc }
            // n = 7, score = 200
            //   899ef4040000         | mov                 dword ptr [esi + 0x4f4], ebx
            //   ff15????????         |                     
            //   8bf8                 | mov                 edi, eax
            //   83ffff               | cmp                 edi, -1
            //   744f                 | je                  0x51
            //   53                   | push                ebx
            //   8d45fc               | lea                 eax, dword ptr [ebp - 4]

        $sequence_6 = { 32db e8???????? 83c40c 8d45fc 50 }
            // n = 5, score = 200
            //   32db                 | xor                 bl, bl
            //   e8????????           |                     
            //   83c40c               | add                 esp, 0xc
            //   8d45fc               | lea                 eax, dword ptr [ebp - 4]
            //   50                   | push                eax

        $sequence_7 = { ffd6 6a40 8d45ac 57 50 c745a844000000 e8???????? }
            // n = 7, score = 200
            //   ffd6                 | call                esi
            //   6a40                 | push                0x40
            //   8d45ac               | lea                 eax, dword ptr [ebp - 0x54]
            //   57                   | push                edi
            //   50                   | push                eax
            //   c745a844000000       | mov                 dword ptr [ebp - 0x58], 0x44
            //   e8????????           |                     

        $sequence_8 = { ff15???????? 8b8c2410020000 5f 5e 33cc }
            // n = 5, score = 100
            //   ff15????????         |                     
            //   8b8c2410020000       | mov                 ecx, dword ptr [esp + 0x210]
            //   5f                   | pop                 edi
            //   5e                   | pop                 esi
            //   33cc                 | xor                 ecx, esp

        $sequence_9 = { 6689442414 e8???????? 83c40c 6a00 ff15???????? 8b35???????? 8b3d???????? }
            // n = 7, score = 100
            //   6689442414           | mov                 word ptr [esp + 0x14], ax
            //   e8????????           |                     
            //   83c40c               | add                 esp, 0xc
            //   6a00                 | push                0
            //   ff15????????         |                     
            //   8b35????????         |                     
            //   8b3d????????         |                     

        $sequence_10 = { 8b35???????? 8b3d???????? 90 68???????? ffd6 85c0 7507 }
            // n = 7, score = 100
            //   8b35????????         |                     
            //   8b3d????????         |                     
            //   90                   | nop                 
            //   68????????           |                     
            //   ffd6                 | call                esi
            //   85c0                 | test                eax, eax
            //   7507                 | jne                 9

        $sequence_11 = { 81c40c020000 c21000 3b0d???????? 7502 f3c3 e9???????? }
            // n = 6, score = 100
            //   81c40c020000         | add                 esp, 0x20c
            //   c21000               | ret                 0x10
            //   3b0d????????         |                     
            //   7502                 | jne                 4
            //   f3c3                 | ret                 
            //   e9????????           |                     

        $sequence_12 = { 33cc 33c0 e8???????? 81c40c020000 c21000 3b0d???????? }
            // n = 6, score = 100
            //   33cc                 | xor                 ecx, esp
            //   33c0                 | xor                 eax, eax
            //   e8????????           |                     
            //   81c40c020000         | add                 esp, 0x20c
            //   c21000               | ret                 0x10
            //   3b0d????????         |                     

        $sequence_13 = { 83f805 74ee 6804010000 8d54240c 6a00 52 }
            // n = 6, score = 100
            //   83f805               | cmp                 eax, 5
            //   74ee                 | je                  0xfffffff0
            //   6804010000           | push                0x104
            //   8d54240c             | lea                 edx, dword ptr [esp + 0xc]
            //   6a00                 | push                0
            //   52                   | push                edx

        $sequence_14 = { 6a00 52 e8???????? 83c40c 6804010000 8d44240c 50 }
            // n = 7, score = 100
            //   6a00                 | push                0
            //   52                   | push                edx
            //   e8????????           |                     
            //   83c40c               | add                 esp, 0xc
            //   6804010000           | push                0x104
            //   8d44240c             | lea                 eax, dword ptr [esp + 0xc]
            //   50                   | push                eax

        $sequence_15 = { ffd6 85c0 7507 ffd7 83f805 74ee 6804010000 }
            // n = 7, score = 100
            //   ffd6                 | call                esi
            //   85c0                 | test                eax, eax
            //   7507                 | jne                 9
            //   ffd7                 | call                edi
            //   83f805               | cmp                 eax, 5
            //   74ee                 | je                  0xfffffff0
            //   6804010000           | push                0x104

    condition:
        7 of them and filesize < 122880
}
Download all Yara Rules