SYMBOLCOMMON_NAMEaka. SYNONYMS
win.telebot (Back to overview)

TeleBot

Actor(s): TeleBots, Sandworm


There is no description at this point.

References
2021-07-27BlackberryBlackBerry Research & Intelligence Team
@techreport{team:20210727:old:3060d53, author = {BlackBerry Research & Intelligence Team}, title = {{Old Dogs New Tricks: Attackers Adopt Exotic Programming Languages}}, date = {2021-07-27}, institution = {Blackberry}, url = {https://www.blackberry.com/content/dam/blackberry-com/asset/enterprise/pdf/direct/report-old-dogs-new-tricks.pdf}, language = {English}, urldate = {2021-07-27} } Old Dogs New Tricks: Attackers Adopt Exotic Programming Languages
elf.wellmess ElectroRAT BazarNimrod Buer Cobalt Strike Remcos Snake TeleBot WellMess Zebrocy
2020SecureworksSecureWorks
@online{secureworks:2020:iron:3c939bc, author = {SecureWorks}, title = {{IRON VIKING}}, date = {2020}, organization = {Secureworks}, url = {https://www.secureworks.com/research/threat-profiles/iron-viking}, language = {English}, urldate = {2020-05-23} } IRON VIKING
BlackEnergy EternalPetya GreyEnergy Industroyer KillDisk TeleBot TeleDoor
2016-12-13ESET ResearchAnton Cherepanov
@online{cherepanov:20161213:rise:d6ee3c1, author = {Anton Cherepanov}, title = {{The rise of TeleBots: Analyzing disruptive KillDisk attacks}}, date = {2016-12-13}, organization = {ESET Research}, url = {http://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/}, language = {English}, urldate = {2019-12-20} } The rise of TeleBots: Analyzing disruptive KillDisk attacks
Credraptor KillDisk TeleBot TeleBots
Yara Rules
[TLP:WHITE] win_telebot_auto (20220516 | Detects win.telebot.)
rule win_telebot_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-05-16"
        version = "1"
        description = "Detects win.telebot."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.telebot"
        malpedia_rule_date = "20220513"
        malpedia_hash = "7f4b2229e6ae614d86d74917f6d5b41890e62a26"
        malpedia_version = "20220516"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { c744244800000000 c744244c00000000 c744245000000000 89742428 890424 ffd5 }
            // n = 6, score = 100
            //   c744244800000000     | mov                 dword ptr [esp + 0x48], 0
            //   c744244c00000000     | mov                 dword ptr [esp + 0x4c], 0
            //   c744245000000000     | mov                 dword ptr [esp + 0x50], 0
            //   89742428             | mov                 dword ptr [esp + 0x28], esi
            //   890424               | mov                 dword ptr [esp], eax
            //   ffd5                 | call                ebp

        $sequence_1 = { c7442404???????? 893424 ffd3 83ec08 85c0 a3???????? 0f84ac050000 }
            // n = 7, score = 100
            //   c7442404????????     |                     
            //   893424               | mov                 dword ptr [esp], esi
            //   ffd3                 | call                ebx
            //   83ec08               | sub                 esp, 8
            //   85c0                 | test                eax, eax
            //   a3????????           |                     
            //   0f84ac050000         | je                  0x5b2

        $sequence_2 = { 69c0f1ff0000 29c3 89d8 0fb75c2414 29c5 89c7 8b442418 }
            // n = 7, score = 100
            //   69c0f1ff0000         | imul                eax, eax, 0xfff1
            //   29c3                 | sub                 ebx, eax
            //   89d8                 | mov                 eax, ebx
            //   0fb75c2414           | movzx               ebx, word ptr [esp + 0x14]
            //   29c5                 | sub                 ebp, eax
            //   89c7                 | mov                 edi, eax
            //   8b442418             | mov                 eax, dword ptr [esp + 0x18]

        $sequence_3 = { 53 89c3 83ec10 c744240800000000 89542404 8b00 }
            // n = 6, score = 100
            //   53                   | push                ebx
            //   89c3                 | mov                 ebx, eax
            //   83ec10               | sub                 esp, 0x10
            //   c744240800000000     | mov                 dword ptr [esp + 8], 0
            //   89542404             | mov                 dword ptr [esp + 4], edx
            //   8b00                 | mov                 eax, dword ptr [eax]

        $sequence_4 = { 53 83ec14 8b5c2420 8b4308 3b430c 734f }
            // n = 6, score = 100
            //   53                   | push                ebx
            //   83ec14               | sub                 esp, 0x14
            //   8b5c2420             | mov                 ebx, dword ptr [esp + 0x20]
            //   8b4308               | mov                 eax, dword ptr [ebx + 8]
            //   3b430c               | cmp                 eax, dword ptr [ebx + 0xc]
            //   734f                 | jae                 0x51

        $sequence_5 = { 891c24 89442404 e8???????? 83c448 }
            // n = 4, score = 100
            //   891c24               | mov                 dword ptr [esp], ebx
            //   89442404             | mov                 dword ptr [esp + 4], eax
            //   e8????????           |                     
            //   83c448               | add                 esp, 0x48

        $sequence_6 = { 89d9 eb08 85ff 0f84770b0000 83c501 0fb645ff 83ef01 }
            // n = 7, score = 100
            //   89d9                 | mov                 ecx, ebx
            //   eb08                 | jmp                 0xa
            //   85ff                 | test                edi, edi
            //   0f84770b0000         | je                  0xb7d
            //   83c501               | add                 ebp, 1
            //   0fb645ff             | movzx               eax, byte ptr [ebp - 1]
            //   83ef01               | sub                 edi, 1

        $sequence_7 = { c70424???????? e8???????? 893c24 c7442404???????? e8???????? 81c440200000 5b }
            // n = 7, score = 100
            //   c70424????????       |                     
            //   e8????????           |                     
            //   893c24               | mov                 dword ptr [esp], edi
            //   c7442404????????     |                     
            //   e8????????           |                     
            //   81c440200000         | add                 esp, 0x2040
            //   5b                   | pop                 ebx

        $sequence_8 = { 89c3 81ec00010000 85c9 0f8e49010000 89cd 8d842484000000 8d8c2400010000 }
            // n = 7, score = 100
            //   89c3                 | mov                 ebx, eax
            //   81ec00010000         | sub                 esp, 0x100
            //   85c9                 | test                ecx, ecx
            //   0f8e49010000         | jle                 0x14f
            //   89cd                 | mov                 ebp, ecx
            //   8d842484000000       | lea                 eax, [esp + 0x84]
            //   8d8c2400010000       | lea                 ecx, [esp + 0x100]

        $sequence_9 = { e9???????? 8b742428 8b4208 31db 8974242c 31f6 }
            // n = 6, score = 100
            //   e9????????           |                     
            //   8b742428             | mov                 esi, dword ptr [esp + 0x28]
            //   8b4208               | mov                 eax, dword ptr [edx + 8]
            //   31db                 | xor                 ebx, ebx
            //   8974242c             | mov                 dword ptr [esp + 0x2c], esi
            //   31f6                 | xor                 esi, esi

    condition:
        7 of them and filesize < 393216
}
Download all Yara Rules