SYMBOLCOMMON_NAMEaka. SYNONYMS
win.tarsip (Back to overview)

Tarsip

Actor(s): Comment Crew


There is no description at this point.

References
2018MandiantMandiant
@techreport{mandiant:2018:apt1:b76cc4d, author = {Mandiant}, title = {{APT1}}, date = {2018}, institution = {Mandiant}, url = {https://github.com/securitykitten/malware_references/blob/master/Appendix%20C%20(Digital)%20-%20The%20Malware%20Arsenal.pdf}, language = {English}, urldate = {2020-01-13} } APT1
Auriga Biscuit Bouncer Combos CookieBag Dairy GetMail GlooxMail Goggles Hacksfase Helauto Kurton ManItsMe MAPIget MiniASP NewsReels SeaSalt StarsyPound Sword TabMsgSQL Tarsip WebC2-AdSpace WebC2-Ausov WebC2-Bolid WebC2-Cson WebC2-DIV WebC2-GreenCat WebC2-Head WebC2-Kt3 WebC2-Qbp WebC2-Rave WebC2-Table WebC2-UGX WebC2-Yahoo
Yara Rules
[TLP:WHITE] win_tarsip_auto (20230125 | Detects win.tarsip.)
rule win_tarsip_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-01-25"
        version = "1"
        description = "Detects win.tarsip."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.tarsip"
        malpedia_rule_date = "20230124"
        malpedia_hash = "2ee0eebba83dce3d019a90519f2f972c0fcf9686"
        malpedia_version = "20230125"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 085d00 83f940 7c96 5f 5d 5b c3 }
            // n = 7, score = 100
            //   085d00               | or                  byte ptr [ebp], bl
            //   83f940               | cmp                 ecx, 0x40
            //   7c96                 | jl                  0xffffff98
            //   5f                   | pop                 edi
            //   5d                   | pop                 ebp
            //   5b                   | pop                 ebx
            //   c3                   | ret                 

        $sequence_1 = { 8d54245c c684248400000001 e8???????? 8b4c241c 55 50 c684248800000002 }
            // n = 7, score = 100
            //   8d54245c             | lea                 edx, [esp + 0x5c]
            //   c684248400000001     | mov                 byte ptr [esp + 0x84], 1
            //   e8????????           |                     
            //   8b4c241c             | mov                 ecx, dword ptr [esp + 0x1c]
            //   55                   | push                ebp
            //   50                   | push                eax
            //   c684248800000002     | mov                 byte ptr [esp + 0x88], 2

        $sequence_2 = { 3acb 75f9 2bc2 83f802 0f8604030000 8a8424e2010000 3c2e }
            // n = 7, score = 100
            //   3acb                 | cmp                 cl, bl
            //   75f9                 | jne                 0xfffffffb
            //   2bc2                 | sub                 eax, edx
            //   83f802               | cmp                 eax, 2
            //   0f8604030000         | jbe                 0x30a
            //   8a8424e2010000       | mov                 al, byte ptr [esp + 0x1e2]
            //   3c2e                 | cmp                 al, 0x2e

        $sequence_3 = { 50 8d4dd4 51 8b450c 8d9004010000 52 }
            // n = 6, score = 100
            //   50                   | push                eax
            //   8d4dd4               | lea                 ecx, [ebp - 0x2c]
            //   51                   | push                ecx
            //   8b450c               | mov                 eax, dword ptr [ebp + 0xc]
            //   8d9004010000         | lea                 edx, [eax + 0x104]
            //   52                   | push                edx

        $sequence_4 = { c684243802000000 e8???????? 83c418 8bf5 e8???????? }
            // n = 5, score = 100
            //   c684243802000000     | mov                 byte ptr [esp + 0x238], 0
            //   e8????????           |                     
            //   83c418               | add                 esp, 0x18
            //   8bf5                 | mov                 esi, ebp
            //   e8????????           |                     

        $sequence_5 = { bb???????? bf???????? e8???????? 837d1810 7205 8b5d04 }
            // n = 6, score = 100
            //   bb????????           |                     
            //   bf????????           |                     
            //   e8????????           |                     
            //   837d1810             | cmp                 dword ptr [ebp + 0x18], 0x10
            //   7205                 | jb                  7
            //   8b5d04               | mov                 ebx, dword ptr [ebp + 4]

        $sequence_6 = { 8b442424 83c0fc 3bc3 895c2410 8be9 895c2418 0f8e65020000 }
            // n = 7, score = 100
            //   8b442424             | mov                 eax, dword ptr [esp + 0x24]
            //   83c0fc               | add                 eax, -4
            //   3bc3                 | cmp                 eax, ebx
            //   895c2410             | mov                 dword ptr [esp + 0x10], ebx
            //   8be9                 | mov                 ebp, ecx
            //   895c2418             | mov                 dword ptr [esp + 0x18], ebx
            //   0f8e65020000         | jle                 0x26b

        $sequence_7 = { 8b742418 81c600020000 8d942434120000 89742418 3bf2 0f82d1fcffff }
            // n = 6, score = 100
            //   8b742418             | mov                 esi, dword ptr [esp + 0x18]
            //   81c600020000         | add                 esi, 0x200
            //   8d942434120000       | lea                 edx, [esp + 0x1234]
            //   89742418             | mov                 dword ptr [esp + 0x18], esi
            //   3bf2                 | cmp                 esi, edx
            //   0f82d1fcffff         | jb                  0xfffffcd7

        $sequence_8 = { eb13 83f801 0f8531010000 8d542418 52 e8???????? }
            // n = 6, score = 100
            //   eb13                 | jmp                 0x15
            //   83f801               | cmp                 eax, 1
            //   0f8531010000         | jne                 0x137
            //   8d542418             | lea                 edx, [esp + 0x18]
            //   52                   | push                edx
            //   e8????????           |                     

        $sequence_9 = { 6a30 53 56 e8???????? 45 83c630 83c40c }
            // n = 7, score = 100
            //   6a30                 | push                0x30
            //   53                   | push                ebx
            //   56                   | push                esi
            //   e8????????           |                     
            //   45                   | inc                 ebp
            //   83c630               | add                 esi, 0x30
            //   83c40c               | add                 esp, 0xc

    condition:
        7 of them and filesize < 360448
}
Download all Yara Rules