SYMBOLCOMMON_NAMEaka. SYNONYMS
win.sysraw_stealer (Back to overview)

Sysraw Stealer

aka: Clipsa

Sysraw stealer got its name because at some point, it was started as "ZSysRaw\sysraw.exe". PDB strings suggest the name "Clipsa" though. First stage connects to /WPCoreLog/, the second one to /WPSecurity/. Its behavior suggest that it is an info stealer. It creates a rather large amount of files in a subdirectory (e.g. data) named "1?[-+].dat" and POSTs them.

References
2019-08-06AvastJan Rubín
@online{rubn:20190806:clipsa:81eb577, author = {Jan Rubín}, title = {{Clipsa – Multipurpose password stealer}}, date = {2019-08-06}, organization = {Avast}, url = {https://decoded.avast.io/janrubin/clipsa-multipurpose-password-stealer/}, language = {English}, urldate = {2020-01-13} } Clipsa – Multipurpose password stealer
Sysraw Stealer
2017-09-21Zerophage
@online{zerophage:20170921:rig:6192ad2, author = {Zerophage}, title = {{Rig EK via Rulan drops an Infostealer}}, date = {2017-09-21}, url = {https://zerophagemalware.com/2017/09/21/rig-ek-via-rulan-drops-an-infostealer/}, language = {English}, urldate = {2020-01-08} } Rig EK via Rulan drops an Infostealer
Sysraw Stealer
Yara Rules
[TLP:WHITE] win_sysraw_stealer_auto (20230407 | Detects win.sysraw_stealer.)
rule win_sysraw_stealer_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-03-28"
        version = "1"
        description = "Detects win.sysraw_stealer."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.sysraw_stealer"
        malpedia_rule_date = "20230328"
        malpedia_hash = "9d2d75cef573c1c2d861f5197df8f563b05a305d"
        malpedia_version = "20230407"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 8b0e 8d542408 52 6a03 57 56 ff513c }
            // n = 7, score = 700
            //   8b0e                 | mov                 ecx, dword ptr [esi]
            //   8d542408             | lea                 edx, [esp + 8]
            //   52                   | push                edx
            //   6a03                 | push                3
            //   57                   | push                edi
            //   56                   | push                esi
            //   ff513c               | call                dword ptr [ecx + 0x3c]

        $sequence_1 = { 8b467c 8d954cfeffff 8b0e 52 8b55e4 }
            // n = 5, score = 700
            //   8b467c               | mov                 eax, dword ptr [esi + 0x7c]
            //   8d954cfeffff         | lea                 edx, [ebp - 0x1b4]
            //   8b0e                 | mov                 ecx, dword ptr [esi]
            //   52                   | push                edx
            //   8b55e4               | mov                 edx, dword ptr [ebp - 0x1c]

        $sequence_2 = { a1???????? 8b5014 2bca 8b500c 8b4510 8d4cca04 }
            // n = 6, score = 700
            //   a1????????           |                     
            //   8b5014               | mov                 edx, dword ptr [eax + 0x14]
            //   2bca                 | sub                 ecx, edx
            //   8b500c               | mov                 edx, dword ptr [eax + 0xc]
            //   8b4510               | mov                 eax, dword ptr [ebp + 0x10]
            //   8d4cca04             | lea                 ecx, [edx + ecx*8 + 4]

        $sequence_3 = { 0f8f74030000 8b08 8b5004 894ddc 8b4808 }
            // n = 5, score = 700
            //   0f8f74030000         | jg                  0x37a
            //   8b08                 | mov                 ecx, dword ptr [eax]
            //   8b5004               | mov                 edx, dword ptr [eax + 4]
            //   894ddc               | mov                 dword ptr [ebp - 0x24], ecx
            //   8b4808               | mov                 ecx, dword ptr [eax + 8]

        $sequence_4 = { 50 68???????? 8d4dd0 51 ff15???????? 50 6801000080 }
            // n = 7, score = 700
            //   50                   | push                eax
            //   68????????           |                     
            //   8d4dd0               | lea                 ecx, [ebp - 0x30]
            //   51                   | push                ecx
            //   ff15????????         |                     
            //   50                   | push                eax
            //   6801000080           | push                0x80000001

        $sequence_5 = { c7400807000000 c7400c0f000000 c740101f000000 c740143f000000 c740187f000000 }
            // n = 5, score = 700
            //   c7400807000000       | mov                 dword ptr [eax + 8], 7
            //   c7400c0f000000       | mov                 dword ptr [eax + 0xc], 0xf
            //   c740101f000000       | mov                 dword ptr [eax + 0x10], 0x1f
            //   c740143f000000       | mov                 dword ptr [eax + 0x14], 0x3f
            //   c740187f000000       | mov                 dword ptr [eax + 0x18], 0x7f

        $sequence_6 = { ff15???????? 668945b0 8d45a8 50 c745a802000000 ff15???????? 8bd0 }
            // n = 7, score = 700
            //   ff15????????         |                     
            //   668945b0             | mov                 word ptr [ebp - 0x50], ax
            //   8d45a8               | lea                 eax, [ebp - 0x58]
            //   50                   | push                eax
            //   c745a802000000       | mov                 dword ptr [ebp - 0x58], 2
            //   ff15????????         |                     
            //   8bd0                 | mov                 edx, eax

        $sequence_7 = { 0fbfd6 23c7 0faf0491 0d00000080 8945ec eb3e 8b5244 }
            // n = 7, score = 700
            //   0fbfd6               | movsx               edx, si
            //   23c7                 | and                 eax, edi
            //   0faf0491             | imul                eax, dword ptr [ecx + edx*4]
            //   0d00000080           | or                  eax, 0x80000000
            //   8945ec               | mov                 dword ptr [ebp - 0x14], eax
            //   eb3e                 | jmp                 0x40
            //   8b5244               | mov                 edx, dword ptr [edx + 0x44]

        $sequence_8 = { 8b5014 2bca 8b500c 8b4510 }
            // n = 4, score = 700
            //   8b5014               | mov                 edx, dword ptr [eax + 0x14]
            //   2bca                 | sub                 ecx, edx
            //   8b500c               | mov                 edx, dword ptr [eax + 0xc]
            //   8b4510               | mov                 eax, dword ptr [ebp + 0x10]

        $sequence_9 = { 57 e8???????? 8bf8 ff15???????? 8b4dec 57 51 }
            // n = 7, score = 700
            //   57                   | push                edi
            //   e8????????           |                     
            //   8bf8                 | mov                 edi, eax
            //   ff15????????         |                     
            //   8b4dec               | mov                 ecx, dword ptr [ebp - 0x14]
            //   57                   | push                edi
            //   51                   | push                ecx

    condition:
        7 of them and filesize < 1540096
}
Download all Yara Rules