SYMBOLCOMMON_NAMEaka. SYNONYMS
win.stresspaint (Back to overview)

Stresspaint

URLhaus    

There is no description at this point.

References
2018-04-18RadwareAdi Raff
@online{raff:20180418:stresspaint:aab45ec, author = {Adi Raff}, title = {{Stresspaint Malware Campaign Targeting Facebook Credentials}}, date = {2018-04-18}, organization = {Radware}, url = {https://blog.radware.com/security/2018/04/stresspaint-malware-campaign-targeting-facebook-credentials/}, language = {English}, urldate = {2019-10-23} } Stresspaint Malware Campaign Targeting Facebook Credentials
Stresspaint
2018-04-18Bleeping ComputerCatalin Cimpanu
@online{cimpanu:20180418:stresspaint:640ad68, author = {Catalin Cimpanu}, title = {{Stresspaint Malware Steals Facebook Credentials and Session Cookies}}, date = {2018-04-18}, organization = {Bleeping Computer}, url = {https://www.bleepingcomputer.com/news/security/stresspaint-malware-steals-facebook-credentials-and-session-cookies/}, language = {English}, urldate = {2019-12-20} } Stresspaint Malware Steals Facebook Credentials and Session Cookies
Stresspaint
2018-04-18RadwareRadware
@online{radware:20180418:stresspaint:dd7a416, author = {Radware}, title = {{Stresspaint Malware Targeting Facebook Credentials}}, date = {2018-04-18}, organization = {Radware}, url = {https://security.radware.com/malware/stresspaint-malware-targeting-facebook-credentials/}, language = {English}, urldate = {2019-11-28} } Stresspaint Malware Targeting Facebook Credentials
Stresspaint
2018-04-18Ars TechnicaDan Goodin
@online{goodin:20180418:tens:ad8fd3a, author = {Dan Goodin}, title = {{Tens of thousands of Facebook accounts compromised in days by malware}}, date = {2018-04-18}, organization = {Ars Technica}, url = {https://arstechnica.com/information-technology/2018/04/tens-of-thousands-of-facebook-accounts-compromised-in-days-by-malware/}, language = {English}, urldate = {2019-11-23} } Tens of thousands of Facebook accounts compromised in days by malware
Stresspaint
Yara Rules
[TLP:WHITE] win_stresspaint_auto (20230715 | Detects win.stresspaint.)
rule win_stresspaint_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-07-11"
        version = "1"
        description = "Detects win.stresspaint."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.stresspaint"
        malpedia_rule_date = "20230705"
        malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41"
        malpedia_version = "20230715"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 0103 014510 294514 83665800 }
            // n = 4, score = 100
            //   0103                 | add                 dword ptr [ebx], eax
            //   014510               | add                 dword ptr [ebp + 0x10], eax
            //   294514               | sub                 dword ptr [ebp + 0x14], eax
            //   83665800             | and                 dword ptr [esi + 0x58], 0

        $sequence_1 = { 010b 8945fc 8bc2 83530400 }
            // n = 4, score = 100
            //   010b                 | add                 dword ptr [ebx], ecx
            //   8945fc               | mov                 dword ptr [ebp - 4], eax
            //   8bc2                 | mov                 eax, edx
            //   83530400             | adc                 dword ptr [ebx + 4], 0

        $sequence_2 = { 8d4c2460 89ac2488000000 51 e8???????? }
            // n = 4, score = 100
            //   8d4c2460             | lea                 ecx, [esp + 0x60]
            //   89ac2488000000       | mov                 dword ptr [esp + 0x88], ebp
            //   51                   | push                ecx
            //   e8????????           |                     

        $sequence_3 = { 0103 014510 294674 8b4674 }
            // n = 4, score = 100
            //   0103                 | add                 dword ptr [ebx], eax
            //   014510               | add                 dword ptr [ebp + 0x10], eax
            //   294674               | sub                 dword ptr [esi + 0x74], eax
            //   8b4674               | mov                 eax, dword ptr [esi + 0x74]

        $sequence_4 = { 8d4c2468 50 51 e8???????? 83c40c }
            // n = 5, score = 100
            //   8d4c2468             | lea                 ecx, [esp + 0x68]
            //   50                   | push                eax
            //   51                   | push                ecx
            //   e8????????           |                     
            //   83c40c               | add                 esp, 0xc

        $sequence_5 = { 0103 ebaa 8b442408 56 }
            // n = 4, score = 100
            //   0103                 | add                 dword ptr [ebx], eax
            //   ebaa                 | jmp                 0xffffffac
            //   8b442408             | mov                 eax, dword ptr [esp + 8]
            //   56                   | push                esi

        $sequence_6 = { 8d4c2460 6aff 51 56 }
            // n = 4, score = 100
            //   8d4c2460             | lea                 ecx, [esp + 0x60]
            //   6aff                 | push                -1
            //   51                   | push                ecx
            //   56                   | push                esi

        $sequence_7 = { 0107 115f04 3bcb 7508 }
            // n = 4, score = 100
            //   0107                 | add                 dword ptr [edi], eax
            //   115f04               | adc                 dword ptr [edi + 4], ebx
            //   3bcb                 | cmp                 ecx, ebx
            //   7508                 | jne                 0xa

        $sequence_8 = { 8d4c245c c684247418000005 e8???????? 55 }
            // n = 4, score = 100
            //   8d4c245c             | lea                 ecx, [esp + 0x5c]
            //   c684247418000005     | mov                 byte ptr [esp + 0x1874], 5
            //   e8????????           |                     
            //   55                   | push                ebp

        $sequence_9 = { 8d4c2468 51 8d4fff 8b44bafc }
            // n = 4, score = 100
            //   8d4c2468             | lea                 ecx, [esp + 0x68]
            //   51                   | push                ecx
            //   8d4fff               | lea                 ecx, [edi - 1]
            //   8b44bafc             | mov                 eax, dword ptr [edx + edi*4 - 4]

        $sequence_10 = { 8d4c2460 50 51 c68424b418000009 }
            // n = 4, score = 100
            //   8d4c2460             | lea                 ecx, [esp + 0x60]
            //   50                   | push                eax
            //   51                   | push                ecx
            //   c68424b418000009     | mov                 byte ptr [esp + 0x18b4], 9

        $sequence_11 = { 0107 83570400 85c9 7508 }
            // n = 4, score = 100
            //   0107                 | add                 dword ptr [edi], eax
            //   83570400             | adc                 dword ptr [edi + 4], 0
            //   85c9                 | test                ecx, ecx
            //   7508                 | jne                 0xa

        $sequence_12 = { 0108 8b8e44010000 114804 8b4f18 }
            // n = 4, score = 100
            //   0108                 | add                 dword ptr [eax], ecx
            //   8b8e44010000         | mov                 ecx, dword ptr [esi + 0x144]
            //   114804               | adc                 dword ptr [eax + 4], ecx
            //   8b4f18               | mov                 ecx, dword ptr [edi + 0x18]

        $sequence_13 = { 0106 83560400 837d1c00 7494 }
            // n = 4, score = 100
            //   0106                 | add                 dword ptr [esi], eax
            //   83560400             | adc                 dword ptr [esi + 4], 0
            //   837d1c00             | cmp                 dword ptr [ebp + 0x1c], 0
            //   7494                 | je                  0xffffff96

        $sequence_14 = { 8d4c245c c644247405 e8???????? 83ec10 33ff }
            // n = 5, score = 100
            //   8d4c245c             | lea                 ecx, [esp + 0x5c]
            //   c644247405           | mov                 byte ptr [esp + 0x74], 5
            //   e8????????           |                     
            //   83ec10               | sub                 esp, 0x10
            //   33ff                 | xor                 edi, edi

        $sequence_15 = { 8d4c2464 51 53 8b5c2468 }
            // n = 4, score = 100
            //   8d4c2464             | lea                 ecx, [esp + 0x64]
            //   51                   | push                ecx
            //   53                   | push                ebx
            //   8b5c2468             | mov                 ebx, dword ptr [esp + 0x68]

    condition:
        7 of them and filesize < 1155072
}
Download all Yara Rules