There is no description at this point.
rule win_tinba_auto { meta: author = "Felix Bilstein - yara-signator at cocacoding dot com" date = "2020-12-22" version = "1" description = "autogenerated rule brought to you by yara-signator" tool = "yara-signator v0.6.0" signator_config = "callsandjumps;datarefs;binvalue" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.tinba" malpedia_rule_date = "20201222" malpedia_hash = "30354d830a29f0fbd3714d93d94dea941d77a130" malpedia_version = "20201023" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" /* DISCLAIMER * The strings used in this rule have been automatically selected from the * disassembly of memory dumps and unpacked files, using YARA-Signator. * The code and documentation is published here: * https://github.com/fxb-cocacoding/yara-signator * As Malpedia is used as data source, please note that for a given * number of families, only single samples are documented. * This likely impacts the degree of generalization these rules will offer. * Take the described generation method also into consideration when you * apply the rules in your use cases and assign them confidence levels. */ strings: $sequence_0 = { 8b7508 ad 50 56 } // n = 4, score = 1100 // 8b7508 | mov esi, dword ptr [ebp + 8] // ad | lodsd eax, dword ptr [esi] // 50 | push eax // 56 | push esi $sequence_1 = { 8b4510 aa 8b450c ab } // n = 4, score = 1100 // 8b4510 | mov eax, dword ptr [ebp + 0x10] // aa | stosb byte ptr es:[edi], al // 8b450c | mov eax, dword ptr [ebp + 0xc] // ab | stosd dword ptr es:[edi], eax $sequence_2 = { 8a241f 88240f 88041f 41 } // n = 4, score = 1000 // 8a241f | mov ah, byte ptr [edi + ebx] // 88240f | mov byte ptr [edi + ecx], ah // 88041f | mov byte ptr [edi + ebx], al // 41 | inc ecx $sequence_3 = { 6a00 6a00 ff750c 6a00 6a00 ff7508 } // n = 6, score = 1000 // 6a00 | push 0 // 6a00 | push 0 // ff750c | push dword ptr [ebp + 0xc] // 6a00 | push 0 // 6a00 | push 0 // ff7508 | push dword ptr [ebp + 8] $sequence_4 = { 48 29fe 48 83ee05 aa 89f0 ab } // n = 7, score = 900 // 48 | dec eax // 29fe | sub esi, edi // 48 | dec eax // 83ee05 | sub esi, 5 // aa | stosb byte ptr es:[edi], al // 89f0 | mov eax, esi // ab | stosd dword ptr es:[edi], eax $sequence_5 = { 84c9 7509 80fd05 7504 834a3508 48 } // n = 6, score = 900 // 84c9 | test cl, cl // 7509 | jne 0xb // 80fd05 | cmp ch, 5 // 7504 | jne 6 // 834a3508 | or dword ptr [edx + 0x35], 8 // 48 | dec eax $sequence_6 = { 8b7d0c 83c707 8b4508 83e00f 3c0a 7304 0430 } // n = 7, score = 900 // 8b7d0c | mov edi, dword ptr [ebp + 0xc] // 83c707 | add edi, 7 // 8b4508 | mov eax, dword ptr [ebp + 8] // 83e00f | and eax, 0xf // 3c0a | cmp al, 0xa // 7304 | jae 6 // 0430 | add al, 0x30 $sequence_7 = { 8b4d10 51 57 ff750c } // n = 4, score = 900 // 8b4d10 | mov ecx, dword ptr [ebp + 0x10] // 51 | push ecx // 57 | push edi // ff750c | push dword ptr [ebp + 0xc] $sequence_8 = { 8b4014 85c0 7403 b073 aa } // n = 5, score = 900 // 8b4014 | mov eax, dword ptr [eax + 0x14] // 85c0 | test eax, eax // 7403 | je 5 // b073 | mov al, 0x73 // aa | stosb byte ptr es:[edi], al $sequence_9 = { 75f8 89f8 5f 5a } // n = 4, score = 900 // 75f8 | jne 0xfffffffa // 89f8 | mov eax, edi // 5f | pop edi // 5a | pop edx $sequence_10 = { 48 83c420 48 85c0 74ce 48 89c7 } // n = 7, score = 900 // 48 | dec eax // 83c420 | add esp, 0x20 // 48 | dec eax // 85c0 | test eax, eax // 74ce | je 0xffffffd0 // 48 | dec eax // 89c7 | mov edi, eax $sequence_11 = { 7416 66b80d0a 66ab b8436f6f6b ab } // n = 5, score = 900 // 7416 | je 0x18 // 66b80d0a | mov ax, 0xa0d // 66ab | stosw word ptr es:[edi], ax // b8436f6f6b | mov eax, 0x6b6f6f43 // ab | stosd dword ptr es:[edi], eax $sequence_12 = { 8b4114 83f8fd 7506 8b4108 8b4014 } // n = 5, score = 900 // 8b4114 | mov eax, dword ptr [ecx + 0x14] // 83f8fd | cmp eax, -3 // 7506 | jne 8 // 8b4108 | mov eax, dword ptr [ecx + 8] // 8b4014 | mov eax, dword ptr [eax + 0x14] condition: 7 of them and filesize < 57344 }
rule win_tinba_w0 { meta: author = "n3sfox <n3sfox@gmail.com>" date = "2015/11/07" description = "Tinba 2 (DGA) banking trojan" reference = "https://securityintelligence.com/tinba-malware-reloaded-and-attacking-banks-around-the-world" filetype = "memory" hash = "c7f662594f07776ab047b322150f6ed0" hash = "dc71ef1e55f1ddb36b3c41b1b95ae586" hash = "b788155cb82a7600f2ed1965cffc1e88" source = "https://github.com/mattulm/sfiles_yara/blob/master/malware/tinba2.yar" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.tinba" malpedia_version = "20170605" malpedia_license = "CC BY-NC-SA 4.0" malpedia_sharing = "TLP:WHITE" strings: $str3 = "NtCreateUserProcess" $str4 = "NtQueryDirectoryFile" $str5 = "RtlCreateUserThread" $str6 = "DeleteUrlCacheEntry" $str7 = "PR_Read" $str8 = "PR_Write" $pubkey = "BEGIN PUBLIC KEY" $code1 = {50 87 44 24 04 6A ?? E8} condition: all of ($str*) and $pubkey and $code1 }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below.
Please propose all changes regarding references on the Malpedia library page
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY