SYMBOLCOMMON_NAMEaka. SYNONYMS
win.terminator_rat (Back to overview)

Terminator RAT

aka: Fakem RAT

There is no description at this point.

References
2013-12-05ESET ResearchESET Research
@techreport{research:20131205:did:2e2631c, author = {ESET Research}, title = {{Did you sayAdvanced Persistent Threats?}}, date = {2013-12-05}, institution = {ESET Research}, url = {https://www.welivesecurity.com/wp-content/uploads/2014/01/Advanced-Persistent-Threats.pdf}, language = {English}, urldate = {2020-01-13} } Did you sayAdvanced Persistent Threats?
Terminator RAT
2013-03-27Malware.luPaul Rascagnères
@techreport{rascagnres:20130327:apt1:87b477e, author = {Paul Rascagnères}, title = {{APT1: technical backstage}}, date = {2013-03-27}, institution = {Malware.lu}, url = {https://malware.lu/assets/files/articles/RAP002_APT1_Technical_backstage.1.0.pdf}, language = {English}, urldate = {2020-01-13} } APT1: technical backstage
Terminator RAT
2013Trend MicroNart Villeneuve, Jessa dela Torre
@techreport{villeneuve:2013:fakem:672c581, author = {Nart Villeneuve and Jessa dela Torre}, title = {{FAKEM RAT}}, date = {2013}, institution = {Trend Micro}, url = {https://documents.trendmicro.com/assets/wp/wp-fakem-rat.pdf}, language = {English}, urldate = {2020-01-06} } FAKEM RAT
Terminator RAT
2012-06-21Contagio DumpMila Parkour
@online{parkour:20120621:rat:2186087, author = {Mila Parkour}, title = {{RAT samples from Syrian Targeted attacks - Blackshades RAT, XTreme RAT, Dark Comet RAT used by Syrian Electronic Army}}, date = {2012-06-21}, organization = {Contagio Dump}, url = {http://contagiodump.blogspot.com/2012/06/rat-samples-from-syrian-targeted.html}, language = {English}, urldate = {2019-12-20} } RAT samples from Syrian Targeted attacks - Blackshades RAT, XTreme RAT, Dark Comet RAT used by Syrian Electronic Army
BlackShades DarkComet Terminator RAT
Yara Rules
[TLP:WHITE] win_terminator_rat_auto (20220808 | Detects win.terminator_rat.)
rule win_terminator_rat_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-08-05"
        version = "1"
        description = "Detects win.terminator_rat."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.terminator_rat"
        malpedia_rule_date = "20220805"
        malpedia_hash = "6ec06c64bcfdbeda64eff021c766b4ce34542b71"
        malpedia_version = "20220808"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 8b7b08 8bf7 8b4b0c ac }
            // n = 4, score = 500
            //   8b7b08               | mov                 edi, dword ptr [ebx + 8]
            //   8bf7                 | mov                 esi, edi
            //   8b4b0c               | mov                 ecx, dword ptr [ebx + 0xc]
            //   ac                   | lodsb               al, byte ptr [esi]

        $sequence_1 = { 8d8700fcffff c78700fcffff1c010000 50 e8???????? }
            // n = 4, score = 500
            //   8d8700fcffff         | lea                 eax, [edi - 0x400]
            //   c78700fcffff1c010000     | mov    dword ptr [edi - 0x400], 0x11c
            //   50                   | push                eax
            //   e8????????           |                     

        $sequence_2 = { 3452 c0c003 3443 c0c003 3448 c0c003 }
            // n = 6, score = 500
            //   3452                 | xor                 al, 0x52
            //   c0c003               | rol                 al, 3
            //   3443                 | xor                 al, 0x43
            //   c0c003               | rol                 al, 3
            //   3448                 | xor                 al, 0x48
            //   c0c003               | rol                 al, 3

        $sequence_3 = { 8bfc 81ec04040000 56 8d87fcfbffff be80000000 }
            // n = 5, score = 500
            //   8bfc                 | mov                 edi, esp
            //   81ec04040000         | sub                 esp, 0x404
            //   56                   | push                esi
            //   8d87fcfbffff         | lea                 eax, [edi - 0x404]
            //   be80000000           | mov                 esi, 0x80

        $sequence_4 = { eb02 33db 8b06 3d12020000 }
            // n = 4, score = 500
            //   eb02                 | jmp                 4
            //   33db                 | xor                 ebx, ebx
            //   8b06                 | mov                 eax, dword ptr [esi]
            //   3d12020000           | cmp                 eax, 0x212

        $sequence_5 = { 55 57 8bc7 83c004 837d0400 }
            // n = 5, score = 500
            //   55                   | push                ebp
            //   57                   | push                edi
            //   8bc7                 | mov                 eax, edi
            //   83c004               | add                 eax, 4
            //   837d0400             | cmp                 dword ptr [ebp + 4], 0

        $sequence_6 = { 56 be00040000 56 ffb515010000 }
            // n = 4, score = 500
            //   56                   | push                esi
            //   be00040000           | mov                 esi, 0x400
            //   56                   | push                esi
            //   ffb515010000         | push                dword ptr [ebp + 0x115]

        $sequence_7 = { 8bf0 8d8549020000 50 56 ff5565 85c0 7403 }
            // n = 7, score = 500
            //   8bf0                 | mov                 esi, eax
            //   8d8549020000         | lea                 eax, [ebp + 0x249]
            //   50                   | push                eax
            //   56                   | push                esi
            //   ff5565               | call                dword ptr [ebp + 0x65]
            //   85c0                 | test                eax, eax
            //   7403                 | je                  5

        $sequence_8 = { c7450400000000 8be8 eb06 50 }
            // n = 4, score = 500
            //   c7450400000000       | mov                 dword ptr [ebp + 4], 0
            //   8be8                 | mov                 ebp, eax
            //   eb06                 | jmp                 8
            //   50                   | push                eax

        $sequence_9 = { 6800040000 50 e8???????? 8d8700fcffff c78700fcffff2b010000 50 e8???????? }
            // n = 7, score = 500
            //   6800040000           | push                0x400
            //   50                   | push                eax
            //   e8????????           |                     
            //   8d8700fcffff         | lea                 eax, [edi - 0x400]
            //   c78700fcffff2b010000     | mov    dword ptr [edi - 0x400], 0x12b
            //   50                   | push                eax
            //   e8????????           |                     

    condition:
        7 of them and filesize < 73728
}
Download all Yara Rules