SYMBOLCOMMON_NAMEaka. SYNONYMS
win.stresspaint (Back to overview)

Stresspaint

URLhaus    

There is no description at this point.

References
2018-04-18RadwareAdi Raff
@online{raff:20180418:stresspaint:aab45ec, author = {Adi Raff}, title = {{Stresspaint Malware Campaign Targeting Facebook Credentials}}, date = {2018-04-18}, organization = {Radware}, url = {https://blog.radware.com/security/2018/04/stresspaint-malware-campaign-targeting-facebook-credentials/}, language = {English}, urldate = {2019-10-23} } Stresspaint Malware Campaign Targeting Facebook Credentials
Stresspaint
2018-04-18Bleeping ComputerCatalin Cimpanu
@online{cimpanu:20180418:stresspaint:640ad68, author = {Catalin Cimpanu}, title = {{Stresspaint Malware Steals Facebook Credentials and Session Cookies}}, date = {2018-04-18}, organization = {Bleeping Computer}, url = {https://www.bleepingcomputer.com/news/security/stresspaint-malware-steals-facebook-credentials-and-session-cookies/}, language = {English}, urldate = {2019-12-20} } Stresspaint Malware Steals Facebook Credentials and Session Cookies
Stresspaint
2018-04-18RadwareRadware
@online{radware:20180418:stresspaint:dd7a416, author = {Radware}, title = {{Stresspaint Malware Targeting Facebook Credentials}}, date = {2018-04-18}, organization = {Radware}, url = {https://security.radware.com/malware/stresspaint-malware-targeting-facebook-credentials/}, language = {English}, urldate = {2019-11-28} } Stresspaint Malware Targeting Facebook Credentials
Stresspaint
2018-04-18Ars TechnicaDan Goodin
@online{goodin:20180418:tens:ad8fd3a, author = {Dan Goodin}, title = {{Tens of thousands of Facebook accounts compromised in days by malware}}, date = {2018-04-18}, organization = {Ars Technica}, url = {https://arstechnica.com/information-technology/2018/04/tens-of-thousands-of-facebook-accounts-compromised-in-days-by-malware/}, language = {English}, urldate = {2019-11-23} } Tens of thousands of Facebook accounts compromised in days by malware
Stresspaint
Yara Rules
[TLP:WHITE] win_stresspaint_auto (20220808 | Detects win.stresspaint.)
rule win_stresspaint_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-08-05"
        version = "1"
        description = "Detects win.stresspaint."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.stresspaint"
        malpedia_rule_date = "20220805"
        malpedia_hash = "6ec06c64bcfdbeda64eff021c766b4ce34542b71"
        malpedia_version = "20220808"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 0103 014510 294514 83665800 }
            // n = 4, score = 100
            //   0103                 | add                 dword ptr [ebx], eax
            //   014510               | add                 dword ptr [ebp + 0x10], eax
            //   294514               | sub                 dword ptr [ebp + 0x14], eax
            //   83665800             | and                 dword ptr [esi + 0x58], 0

        $sequence_1 = { 8d4c2434 50 51 e8???????? 83c40c }
            // n = 5, score = 100
            //   8d4c2434             | lea                 ecx, [esp + 0x34]
            //   50                   | push                eax
            //   51                   | push                ecx
            //   e8????????           |                     
            //   83c40c               | add                 esp, 0xc

        $sequence_2 = { 0106 83560400 837d1c00 7494 }
            // n = 4, score = 100
            //   0106                 | add                 dword ptr [esi], eax
            //   83560400             | adc                 dword ptr [esi + 4], 0
            //   837d1c00             | cmp                 dword ptr [ebp + 0x1c], 0
            //   7494                 | je                  0xffffff96

        $sequence_3 = { 8d4c2434 51 e8???????? 8b442424 }
            // n = 4, score = 100
            //   8d4c2434             | lea                 ecx, [esp + 0x34]
            //   51                   | push                ecx
            //   e8????????           |                     
            //   8b442424             | mov                 eax, dword ptr [esp + 0x24]

        $sequence_4 = { 8d4c2434 51 6a00 57 }
            // n = 4, score = 100
            //   8d4c2434             | lea                 ecx, [esp + 0x34]
            //   51                   | push                ecx
            //   6a00                 | push                0
            //   57                   | push                edi

        $sequence_5 = { 0103 ebaa 8b442408 56 }
            // n = 4, score = 100
            //   0103                 | add                 dword ptr [ebx], eax
            //   ebaa                 | jmp                 0xffffffac
            //   8b442408             | mov                 eax, dword ptr [esp + 8]
            //   56                   | push                esi

        $sequence_6 = { 8d4c2434 50 8b4208 51 }
            // n = 4, score = 100
            //   8d4c2434             | lea                 ecx, [esp + 0x34]
            //   50                   | push                eax
            //   8b4208               | mov                 eax, dword ptr [edx + 8]
            //   51                   | push                ecx

        $sequence_7 = { 0107 115f04 3bcb 7508 }
            // n = 4, score = 100
            //   0107                 | add                 dword ptr [edi], eax
            //   115f04               | adc                 dword ptr [edi + 4], ebx
            //   3bcb                 | cmp                 ecx, ebx
            //   7508                 | jne                 0xa

        $sequence_8 = { 8d4c2430 e8???????? 8bf0 bf???????? }
            // n = 4, score = 100
            //   8d4c2430             | lea                 ecx, [esp + 0x30]
            //   e8????????           |                     
            //   8bf0                 | mov                 esi, eax
            //   bf????????           |                     

        $sequence_9 = { 0107 83570400 85c9 7508 }
            // n = 4, score = 100
            //   0107                 | add                 dword ptr [edi], eax
            //   83570400             | adc                 dword ptr [edi + 4], 0
            //   85c9                 | test                ecx, ecx
            //   7508                 | jne                 0xa

        $sequence_10 = { 0103 014510 294674 8b4674 }
            // n = 4, score = 100
            //   0103                 | add                 dword ptr [ebx], eax
            //   014510               | add                 dword ptr [ebp + 0x10], eax
            //   294674               | sub                 dword ptr [esi + 0x74], eax
            //   8b4674               | mov                 eax, dword ptr [esi + 0x74]

        $sequence_11 = { 010b 8945fc 8bc2 83530400 }
            // n = 4, score = 100
            //   010b                 | add                 dword ptr [ebx], ecx
            //   8945fc               | mov                 dword ptr [ebp - 4], eax
            //   8bc2                 | mov                 eax, edx
            //   83530400             | adc                 dword ptr [ebx + 4], 0

        $sequence_12 = { 8d4c2434 51 50 53 e8???????? 8b542420 }
            // n = 6, score = 100
            //   8d4c2434             | lea                 ecx, [esp + 0x34]
            //   51                   | push                ecx
            //   50                   | push                eax
            //   53                   | push                ebx
            //   e8????????           |                     
            //   8b542420             | mov                 edx, dword ptr [esp + 0x20]

        $sequence_13 = { 8d4c2430 e8???????? 8bd8 85f6 0f8f24010000 }
            // n = 5, score = 100
            //   8d4c2430             | lea                 ecx, [esp + 0x30]
            //   e8????????           |                     
            //   8bd8                 | mov                 ebx, eax
            //   85f6                 | test                esi, esi
            //   0f8f24010000         | jg                  0x12a

        $sequence_14 = { 8d4c2434 50 6a00 51 }
            // n = 4, score = 100
            //   8d4c2434             | lea                 ecx, [esp + 0x34]
            //   50                   | push                eax
            //   6a00                 | push                0
            //   51                   | push                ecx

        $sequence_15 = { 0108 8b8e44010000 114804 8b4f18 }
            // n = 4, score = 100
            //   0108                 | add                 dword ptr [eax], ecx
            //   8b8e44010000         | mov                 ecx, dword ptr [esi + 0x144]
            //   114804               | adc                 dword ptr [eax + 4], ecx
            //   8b4f18               | mov                 ecx, dword ptr [edi + 0x18]

    condition:
        7 of them and filesize < 1155072
}
Download all Yara Rules