Actor(s): Tonto Team
There is no description at this point.
rule win_typehash_auto { meta: author = "Felix Bilstein - yara-signator at cocacoding dot com" date = "2022-04-08" version = "1" description = "Detects win.typehash." info = "autogenerated rule brought to you by yara-signator" tool = "yara-signator v0.6.0" signator_config = "callsandjumps;datarefs;binvalue" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.typehash" malpedia_rule_date = "20220405" malpedia_hash = "ecd38294bd47d5589be5cd5490dc8bb4804afc2a" malpedia_version = "20220411" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" /* DISCLAIMER * The strings used in this rule have been automatically selected from the * disassembly of memory dumps and unpacked files, using YARA-Signator. * The code and documentation is published here: * https://github.com/fxb-cocacoding/yara-signator * As Malpedia is used as data source, please note that for a given * number of families, only single samples are documented. * This likely impacts the degree of generalization these rules will offer. * Take the described generation method also into consideration when you * apply the rules in your use cases and assign them confidence levels. */ strings: $sequence_0 = { 8b0d???????? 8bf9 3bc7 7302 8bf8 } // n = 5, score = 100 // 8b0d???????? | // 8bf9 | mov edi, ecx // 3bc7 | cmp eax, edi // 7302 | jae 4 // 8bf8 | mov edi, eax $sequence_1 = { 03f0 3bc8 8974243c 8bf8 7263 8b35???????? } // n = 6, score = 100 // 03f0 | add esi, eax // 3bc8 | cmp ecx, eax // 8974243c | mov dword ptr [esp + 0x3c], esi // 8bf8 | mov edi, eax // 7263 | jb 0x65 // 8b35???????? | $sequence_2 = { 83e61f 8b0485e03d4100 8b04f0 83f8ff 7404 85c0 7503 } // n = 7, score = 100 // 83e61f | and esi, 0x1f // 8b0485e03d4100 | mov eax, dword ptr [eax*4 + 0x413de0] // 8b04f0 | mov eax, dword ptr [eax + esi*8] // 83f8ff | cmp eax, -1 // 7404 | je 6 // 85c0 | test eax, eax // 7503 | jne 5 $sequence_3 = { 74e7 3b4614 77e2 8b4e1c 5f 5e 5d } // n = 7, score = 100 // 74e7 | je 0xffffffe9 // 3b4614 | cmp eax, dword ptr [esi + 0x14] // 77e2 | ja 0xffffffe4 // 8b4e1c | mov ecx, dword ptr [esi + 0x1c] // 5f | pop edi // 5e | pop esi // 5d | pop ebp $sequence_4 = { c68424cc00000001 e8???????? 8b44241c 3d00280000 7312 68???????? e8???????? } // n = 7, score = 100 // c68424cc00000001 | mov byte ptr [esp + 0xcc], 1 // e8???????? | // 8b44241c | mov eax, dword ptr [esp + 0x1c] // 3d00280000 | cmp eax, 0x2800 // 7312 | jae 0x14 // 68???????? | // e8???????? | $sequence_5 = { c705????????01000000 50 a3???????? e8???????? 8db64c2c4100 } // n = 5, score = 100 // c705????????01000000 | // 50 | push eax // a3???????? | // e8???????? | // 8db64c2c4100 | lea esi, dword ptr [esi + 0x412c4c] $sequence_6 = { 8d4c2418 e8???????? 84c0 7427 } // n = 4, score = 100 // 8d4c2418 | lea ecx, dword ptr [esp + 0x18] // e8???????? | // 84c0 | test al, al // 7427 | je 0x29 $sequence_7 = { 8b0d???????? 3d00280000 895c2424 7211 51 6800280000 8d4c2418 } // n = 7, score = 100 // 8b0d???????? | // 3d00280000 | cmp eax, 0x2800 // 895c2424 | mov dword ptr [esp + 0x24], ebx // 7211 | jb 0x13 // 51 | push ecx // 6800280000 | push 0x2800 // 8d4c2418 | lea ecx, dword ptr [esp + 0x18] $sequence_8 = { 68d0070000 ff15???????? b940000000 33c0 bf???????? f3ab 8bc5 } // n = 7, score = 100 // 68d0070000 | push 0x7d0 // ff15???????? | // b940000000 | mov ecx, 0x40 // 33c0 | xor eax, eax // bf???????? | // f3ab | rep stosd dword ptr es:[edi], eax // 8bc5 | mov eax, ebp $sequence_9 = { 8d4c2430 e8???????? 6a01 8d4c2450 c68424cc00000001 e8???????? bf???????? } // n = 7, score = 100 // 8d4c2430 | lea ecx, dword ptr [esp + 0x30] // e8???????? | // 6a01 | push 1 // 8d4c2450 | lea ecx, dword ptr [esp + 0x50] // c68424cc00000001 | mov byte ptr [esp + 0xcc], 1 // e8???????? | // bf???????? | condition: 7 of them and filesize < 180224 }
rule win_typehash_w0 { meta: author = "Jeff White (karttoon@gmail.com) @noottrak" date = "15APR2020" hash = "d81ba465fe59e7d600f7ab0e8161246a5badd8ae2c3084f76442fb49f6585e95" description = "Detects an observed Negastealer campaign payload" source = "https://github.com/karttoon/iocs/blob/899dac6045a73045baa8966a16b7402d625ee26b/Negasteal/troj_win_negasteal.yar" malpedia_rule_date = "20200817" malpedia_hash = "" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.typehash" malpedia_version = "20201007" malpedia_license = "CC BY-NC-SA 4.0" malpedia_sharing = "TLP:WHITE" strings: $s1 = "Mozilla/5.0 (Windows NT 5.2) AppleWebKit/534.30 (KHTML, like Gecko) Chrome/12.0.742.122 Safari/534.30" $s2 = "news.php" $s3 = "http://%s/%s" $s4 = "type=0" $s5 = "time=%s" condition: all of them }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below.
Please propose all changes regarding references on the Malpedia library page
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY