According to Trend Micro, this is a backdoor abusing the Dropbox API, used by threat actor Earth Yako.
rule win_transbox_auto { meta: author = "Felix Bilstein - yara-signator at cocacoding dot com" date = "2026-05-04" version = "1" description = "Detects win.transbox." info = "autogenerated rule brought to you by yara-signator" tool = "yara-signator v0.6.0" signator_config = "callsandjumps;datarefs;binvalue" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.transbox" malpedia_rule_date = "20260422" malpedia_hash = "a182e35da64e6d71cb55f125c4d4225196523f14" malpedia_version = "20260504" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" /* DISCLAIMER * The strings used in this rule have been automatically selected from the * disassembly of memory dumps and unpacked files, using YARA-Signator. * The code and documentation is published here: * https://github.com/fxb-cocacoding/yara-signator * As Malpedia is used as data source, please note that for a given * number of families, only single samples are documented. * This likely impacts the degree of generalization these rules will offer. * Take the described generation method also into consideration when you * apply the rules in your use cases and assign them confidence levels. */ strings: $sequence_0 = { 6683f95a 7609 8d419f 6683f819 7771 53 } // n = 6, score = 100 // 6683f95a | cmp cx, 0x5a // 7609 | jbe 0xb // 8d419f | lea eax, [ecx - 0x61] // 6683f819 | cmp ax, 0x19 // 7771 | ja 0x73 // 53 | push ebx $sequence_1 = { 50 6a01 e8???????? ffb5ccd3ffff 68???????? ff15???????? 59 } // n = 7, score = 100 // 50 | push eax // 6a01 | push 1 // e8???????? | // ffb5ccd3ffff | push dword ptr [ebp - 0x2c34] // 68???????? | // ff15???????? | // 59 | pop ecx $sequence_2 = { c20800 68???????? e8???????? cc b8???????? c3 55 } // n = 7, score = 100 // c20800 | ret 8 // 68???????? | // e8???????? | // cc | int3 // b8???????? | // c3 | ret // 55 | push ebp $sequence_3 = { 57 56 ff7508 e8???????? e9???????? 53 ff7508 } // n = 7, score = 100 // 57 | push edi // 56 | push esi // ff7508 | push dword ptr [ebp + 8] // e8???????? | // e9???????? | // 53 | push ebx // ff7508 | push dword ptr [ebp + 8] $sequence_4 = { 740c c74318acbb0110 befdffffff 8b4b28 57 51 } // n = 6, score = 100 // 740c | je 0xe // c74318acbb0110 | mov dword ptr [ebx + 0x18], 0x1001bbac // befdffffff | mov esi, 0xfffffffd // 8b4b28 | mov ecx, dword ptr [ebx + 0x28] // 57 | push edi // 51 | push ecx $sequence_5 = { 8d45d4 53 0f4345d4 8945d0 e8???????? 8bf8 397de4 } // n = 7, score = 100 // 8d45d4 | lea eax, [ebp - 0x2c] // 53 | push ebx // 0f4345d4 | cmovae eax, dword ptr [ebp - 0x2c] // 8945d0 | mov dword ptr [ebp - 0x30], eax // e8???????? | // 8bf8 | mov edi, eax // 397de4 | cmp dword ptr [ebp - 0x1c], edi $sequence_6 = { 59 6a69 58 6a36 } // n = 4, score = 100 // 59 | pop ecx // 6a69 | push 0x69 // 58 | pop eax // 6a36 | push 0x36 $sequence_7 = { 50 50 8d85b8fbffff 68???????? 50 e8???????? } // n = 6, score = 100 // 50 | push eax // 50 | push eax // 8d85b8fbffff | lea eax, [ebp - 0x448] // 68???????? | // 50 | push eax // e8???????? | $sequence_8 = { 66898338070000 e8???????? 898334070000 8d45f8 50 8d8308020000 } // n = 6, score = 100 // 66898338070000 | mov word ptr [ebx + 0x738], ax // e8???????? | // 898334070000 | mov dword ptr [ebx + 0x734], eax // 8d45f8 | lea eax, [ebp - 8] // 50 | push eax // 8d8308020000 | lea eax, [ebx + 0x208] $sequence_9 = { 50 51 ff15???????? 8bd8 83c40c 85db 7434 } // n = 7, score = 100 // 50 | push eax // 51 | push ecx // ff15???????? | // 8bd8 | mov ebx, eax // 83c40c | add esp, 0xc // 85db | test ebx, ebx // 7434 | je 0x36 condition: 7 of them and filesize < 288768 }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below. Changes regarding references should be proposed on the Malpedia library page.
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY