SYMBOLCOMMON_NAMEaka. SYNONYMS
win.terminator_rat (Back to overview)

Terminator RAT

aka: Fakem RAT

There is no description at this point.

References
2013-12-05ESET ResearchESET Research
@techreport{research:20131205:did:2e2631c, author = {ESET Research}, title = {{Did you sayAdvanced Persistent Threats?}}, date = {2013-12-05}, institution = {ESET Research}, url = {https://www.welivesecurity.com/wp-content/uploads/2014/01/Advanced-Persistent-Threats.pdf}, language = {English}, urldate = {2020-01-13} } Did you sayAdvanced Persistent Threats?
Terminator RAT
2013-03-27Malware.luPaul Rascagnères
@techreport{rascagnres:20130327:apt1:87b477e, author = {Paul Rascagnères}, title = {{APT1: technical backstage}}, date = {2013-03-27}, institution = {Malware.lu}, url = {https://malware.lu/assets/files/articles/RAP002_APT1_Technical_backstage.1.0.pdf}, language = {English}, urldate = {2020-01-13} } APT1: technical backstage
Terminator RAT
2013Trend MicroNart Villeneuve, Jessa dela Torre
@techreport{villeneuve:2013:fakem:672c581, author = {Nart Villeneuve and Jessa dela Torre}, title = {{FAKEM RAT}}, date = {2013}, institution = {Trend Micro}, url = {https://documents.trendmicro.com/assets/wp/wp-fakem-rat.pdf}, language = {English}, urldate = {2020-01-06} } FAKEM RAT
Terminator RAT
2012-06-21Contagio DumpMila Parkour
@online{parkour:20120621:rat:2186087, author = {Mila Parkour}, title = {{RAT samples from Syrian Targeted attacks - Blackshades RAT, XTreme RAT, Dark Comet RAT used by Syrian Electronic Army}}, date = {2012-06-21}, organization = {Contagio Dump}, url = {http://contagiodump.blogspot.com/2012/06/rat-samples-from-syrian-targeted.html}, language = {English}, urldate = {2019-12-20} } RAT samples from Syrian Targeted attacks - Blackshades RAT, XTreme RAT, Dark Comet RAT used by Syrian Electronic Army
BlackShades DarkComet Terminator RAT
Yara Rules
[TLP:WHITE] win_terminator_rat_auto (20221125 | Detects win.terminator_rat.)
rule win_terminator_rat_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-11-21"
        version = "1"
        description = "Detects win.terminator_rat."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.terminator_rat"
        malpedia_rule_date = "20221118"
        malpedia_hash = "e0702e2e6d1d00da65c8a29a4ebacd0a4c59e1af"
        malpedia_version = "20221125"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 56 ffb515010000 e8???????? 56 }
            // n = 4, score = 500
            //   56                   | push                esi
            //   ffb515010000         | push                dword ptr [ebp + 0x115]
            //   e8????????           |                     
            //   56                   | push                esi

        $sequence_1 = { 8bfc 81ec04040000 56 8d87fcfbffff be80000000 }
            // n = 5, score = 500
            //   8bfc                 | mov                 edi, esp
            //   81ec04040000         | sub                 esp, 0x404
            //   56                   | push                esi
            //   8d87fcfbffff         | lea                 eax, [edi - 0x404]
            //   be80000000           | mov                 esi, 0x80

        $sequence_2 = { 50 e8???????? 83f8ff 7408 81c400040000 }
            // n = 5, score = 500
            //   50                   | push                eax
            //   e8????????           |                     
            //   83f8ff               | cmp                 eax, -1
            //   7408                 | je                  0xa
            //   81c400040000         | add                 esp, 0x400

        $sequence_3 = { 8b4b0c ac 3459 c0c803 3448 c0c803 }
            // n = 6, score = 500
            //   8b4b0c               | mov                 ecx, dword ptr [ebx + 0xc]
            //   ac                   | lodsb               al, byte ptr [esi]
            //   3459                 | xor                 al, 0x59
            //   c0c803               | ror                 al, 3
            //   3448                 | xor                 al, 0x48
            //   c0c803               | ror                 al, 3

        $sequence_4 = { 8d855e020000 50 ff556d 8bf0 }
            // n = 4, score = 500
            //   8d855e020000         | lea                 eax, [ebp + 0x25e]
            //   50                   | push                eax
            //   ff556d               | call                dword ptr [ebp + 0x6d]
            //   8bf0                 | mov                 esi, eax

        $sequence_5 = { 75d0 899d31010000 6800040000 ffb519010000 e8???????? ffb53d010000 ffb535010000 }
            // n = 7, score = 500
            //   75d0                 | jne                 0xffffffd2
            //   899d31010000         | mov                 dword ptr [ebp + 0x131], ebx
            //   6800040000           | push                0x400
            //   ffb519010000         | push                dword ptr [ebp + 0x119]
            //   e8????????           |                     
            //   ffb53d010000         | push                dword ptr [ebp + 0x13d]
            //   ffb535010000         | push                dword ptr [ebp + 0x135]

        $sequence_6 = { 56 ff5565 85c0 7403 }
            // n = 4, score = 500
            //   56                   | push                esi
            //   ff5565               | call                dword ptr [ebp + 0x65]
            //   85c0                 | test                eax, eax
            //   7403                 | je                  5

        $sequence_7 = { 56 be00040000 8d8700fcffff 56 50 e8???????? }
            // n = 6, score = 500
            //   56                   | push                esi
            //   be00040000           | mov                 esi, 0x400
            //   8d8700fcffff         | lea                 eax, [edi - 0x400]
            //   56                   | push                esi
            //   50                   | push                eax
            //   e8????????           |                     

        $sequence_8 = { 8b8539010000 03c1 50 e8???????? 8b4610 018539010000 395e14 }
            // n = 7, score = 500
            //   8b8539010000         | mov                 eax, dword ptr [ebp + 0x139]
            //   03c1                 | add                 eax, ecx
            //   50                   | push                eax
            //   e8????????           |                     
            //   8b4610               | mov                 eax, dword ptr [esi + 0x10]
            //   018539010000         | add                 dword ptr [ebp + 0x139], eax
            //   395e14               | cmp                 dword ptr [esi + 0x14], ebx

        $sequence_9 = { ffd6 85c0 742f 8b400c }
            // n = 4, score = 500
            //   ffd6                 | call                esi
            //   85c0                 | test                eax, eax
            //   742f                 | je                  0x31
            //   8b400c               | mov                 eax, dword ptr [eax + 0xc]

    condition:
        7 of them and filesize < 73728
}
Download all Yara Rules