SYMBOLCOMMON_NAMEaka. SYNONYMS
win.sockbot (Back to overview)

Sockbot


Sockbot is a customized and in Go written fork of the Ligolo reverse tunneling open-source
tool. Several modification were performed by the threat actors who rewrote that code, e.g. execution checks, hardcoded values.
Ligolo: https://github.com/sysdream/ligolo

References
2022-08-04YouTube (Security Joes)Felipe Duarte, Ido Naor
Sockbot In Goland - Linking APT Actors With Ransomware Gangs
Sockbot
2022-03-09Security JoesFelipe Duarte, Ido Naor
Sockbot in GoLand
lsassDumper Sockbot
2022-03-09Bleeping ComputerBill Toulas
Hackers fork open-source reverse tunneling tool for persistence
lsassDumper Sockbot
Yara Rules
[TLP:WHITE] win_sockbot_w0 (20220310 | Detects Go binary Sockbot)
rule win_sockbot_w0 {
	meta:
		author = "Felipe Duarte, Security Joes"
		description = "Detects Go binary Sockbot"
		hash = "7dc13eae4e15869024ec1fd2650e4f8444d53dfa2dd7d302f845cd94289fe5f2"
        malpedia_rule_date = "20220310"
        malpedia_hash = ""
		malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.sockbot"
		malpedia_version = "20220310"
		malpedia_license = "CC BY-NC-SA 4.0"
		malpedia_sharing = "TLP:WHITE"
	strings:
		$str1 = "main.handleRelay"
		$str2 = "main.verifyTlsCertificate"
		$str3 = "main.FindProcess"
		$str4 = "main.hideConsole"
		$str5 = "main.startSocksProxy"
		$str6 = "main.CreateSchedTask"
		$str7 = "main.relay"
		$str8 = "Connecting to relay server..."
		$str9 = "Could not start SOCKS5 proxy !"
	condition:
		uint16(0) == 0x5A4D 
		and all of them
}
Download all Yara Rules