SYMBOLCOMMON_NAMEaka. SYNONYMS
win.vawtrak (Back to overview)

Vawtrak

aka: Catch, grabnew, NeverQuest

Actor(s): Lunar Spider

URLhaus    

There is no description at this point.

References
2023-03-19Ilan Duhin
@online{duhin:20230319:vawtrak:1cccd8c, author = {Ilan Duhin}, title = {{Vawtrak Analysis}}, date = {2023-03-19}, url = {https://medium.com/@Ilandu/vawtrak-malware-824818c1837}, language = {English}, urldate = {2023-03-20} } Vawtrak Analysis
Vawtrak
2022-08-18IBMCharlotte Hammond, Ole Villadsen
@online{hammond:20220818:from:501e8ac, author = {Charlotte Hammond and Ole Villadsen}, title = {{From Ramnit To Bumblebee (via NeverQuest): Similarities and Code Overlap Shed Light On Relationships Between Malware Developers}}, date = {2022-08-18}, organization = {IBM}, url = {https://securityintelligence.com/posts/from-ramnit-to-bumblebee-via-neverquest}, language = {English}, urldate = {2022-08-28} } From Ramnit To Bumblebee (via NeverQuest): Similarities and Code Overlap Shed Light On Relationships Between Malware Developers
BumbleBee Karius Ramnit TrickBot Vawtrak
2021-09-03Trend MicroMohamad Mokbel
@techreport{mokbel:20210903:state:df86499, author = {Mohamad Mokbel}, title = {{The State of SSL/TLS Certificate Usage in Malware C&C Communications}}, date = {2021-09-03}, institution = {Trend Micro}, url = {https://www.trendmicro.com/content/dam/trendmicro/global/en/research/21/i/ssl-tls-technical-brief/ssl-tls-technical-brief.pdf}, language = {English}, urldate = {2021-09-19} } The State of SSL/TLS Certificate Usage in Malware C&C Communications
AdWind ostap AsyncRAT BazarBackdoor BitRAT Buer Chthonic CloudEyE Cobalt Strike DCRat Dridex FindPOS GootKit Gozi IcedID ISFB Nanocore RAT Orcus RAT PandaBanker Qadars QakBot Quasar RAT Rockloader ServHelper Shifu SManager TorrentLocker TrickBot Vawtrak Zeus Zloader
2020-08-09F5 LabsRemi Cohen, Debbie Walkowski
@online{cohen:20200809:banking:8718999, author = {Remi Cohen and Debbie Walkowski}, title = {{Banking Trojans: A Reference Guide to the Malware Family Tree}}, date = {2020-08-09}, organization = {F5 Labs}, url = {https://www.f5.com/labs/articles/education/banking-trojans-a-reference-guide-to-the-malware-family-tree}, language = {English}, urldate = {2021-06-29} } Banking Trojans: A Reference Guide to the Malware Family Tree
BackSwap Carberp Citadel DanaBot Dridex Dyre Emotet Gozi Kronos PandaBanker Ramnit Shylock SpyEye Tinba TrickBot Vawtrak Zeus
2019-02-15CrowdStrikeBrendon Feeley, Bex Hartley
@online{feeley:20190215:sinful:729f693, author = {Brendon Feeley and Bex Hartley}, title = {{“Sin”-ful SPIDERS: WIZARD SPIDER and LUNAR SPIDER Sharing the Same Web}}, date = {2019-02-15}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/sin-ful-spiders-wizard-spider-and-lunar-spider-sharing-the-same-web/}, language = {English}, urldate = {2019-12-20} } “Sin”-ful SPIDERS: WIZARD SPIDER and LUNAR SPIDER Sharing the Same Web
Dyre IcedID TrickBot Vawtrak LUNAR SPIDER WIZARD SPIDER
2018-08-09Fox-ITAlfred Klason
@online{klason:20180809:bokbot:499f316, author = {Alfred Klason}, title = {{Bokbot: The (re)birth of a banker}}, date = {2018-08-09}, organization = {Fox-IT}, url = {https://blog.fox-it.com/2018/08/09/bokbot-the-rebirth-of-a-banker/}, language = {English}, urldate = {2019-12-20} } Bokbot: The (re)birth of a banker
IcedID Vawtrak
2017-01-22The Hacker NewsMohit Kumar
@online{kumar:20170122:russian:a19c81e, author = {Mohit Kumar}, title = {{Russian Hacker behind 'NeverQuest' Malware, Wanted by FBI, Is Arrested in Spain}}, date = {2017-01-22}, organization = {The Hacker News}, url = {http://thehackernews.com/2017/01/neverquest-fbi-hacker.html}, language = {English}, urldate = {2019-12-18} } Russian Hacker behind 'NeverQuest' Malware, Wanted by FBI, Is Arrested in Spain
Vawtrak
2016-09BluelivBlueliv
@techreport{blueliv:201609:chasing:1c02f62, author = {Blueliv}, title = {{Chasing Cybercrime: Network insights into Vawtrak v2}}, date = {2016-09}, institution = {Blueliv}, url = {https://www.blueliv.com/downloads/network-insights-into-vawtrak-v2.pdf}, language = {English}, urldate = {2020-01-07} } Chasing Cybercrime: Network insights into Vawtrak v2
Vawtrak
2016-07-12Fidelis CybersecurityThreat Research Team
@online{team:20160712:me:d8f4707, author = {Threat Research Team}, title = {{Me and Mr. Robot: Tracking the Actor Behind the MAN1 Crypter}}, date = {2016-07-12}, organization = {Fidelis Cybersecurity}, url = {https://fidelissecurity.com/threatgeek/archive/me-and-mr-robot-tracking-actor-behind-man1-crypter/}, language = {English}, urldate = {2021-07-29} } Me and Mr. Robot: Tracking the Actor Behind the MAN1 Crypter
Hancitor Vawtrak
2016-04-21ThreatpostTom Spring
@online{spring:20160421:pos:008ddcb, author = {Tom Spring}, title = {{PoS Attacks Net Crooks 20 Million Stolen Bank Cards}}, date = {2016-04-21}, organization = {Threatpost}, url = {https://threatpost.com/pos-attacks-net-crooks-20-million-stolen-bank-cards/117595/}, language = {English}, urldate = {2020-01-10} } PoS Attacks Net Crooks 20 Million Stolen Bank Cards
Vawtrak
2014-12-19PhishLabsDon Jackson
@online{jackson:20141219:unrelenting:f3f3ccf, author = {Don Jackson}, title = {{The unrelenting evolution of Vawtrak}}, date = {2014-12-19}, organization = {PhishLabs}, url = {https://info.phishlabs.com/blog/the-unrelenting-evolution-of-vawtrak}, language = {English}, urldate = {2019-11-04} } The unrelenting evolution of Vawtrak
Vawtrak
2014-12-17SecureworksBrett Stone-Gross, Pallav Khandhar
@online{stonegross:20141217:dyre:8486e19, author = {Brett Stone-Gross and Pallav Khandhar}, title = {{Dyre Banking Trojan}}, date = {2014-12-17}, organization = {Secureworks}, url = {https://www.secureworks.com/research/dyre-banking-trojan}, language = {English}, urldate = {2021-05-28} } Dyre Banking Trojan
Dyre Vawtrak WIZARD SPIDER
Yara Rules
[TLP:WHITE] win_vawtrak_auto (20230125 | Detects win.vawtrak.)
rule win_vawtrak_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-01-25"
        version = "1"
        description = "Detects win.vawtrak."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.vawtrak"
        malpedia_rule_date = "20230124"
        malpedia_hash = "2ee0eebba83dce3d019a90519f2f972c0fcf9686"
        malpedia_version = "20230125"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 6a01 ff35???????? 6a04 6a01 50 }
            // n = 5, score = 2700
            //   6a01                 | dec                 eax
            //   ff35????????         |                     
            //   6a04                 | mov                 edi, ecx
            //   6a01                 | dec                 eax
            //   50                   | test                eax, eax

        $sequence_1 = { 50 6a00 6a00 e8???????? 50 ff15???????? }
            // n = 6, score = 2600
            //   50                   | push                eax
            //   6a00                 | push                4
            //   6a00                 | push                1
            //   e8????????           |                     
            //   50                   | push                eax
            //   ff15????????         |                     

        $sequence_2 = { e8???????? 85c0 75f4 40 }
            // n = 4, score = 2400
            //   e8????????           |                     
            //   85c0                 | push                1
            //   75f4                 | push                eax
            //   40                   | test                eax, eax

        $sequence_3 = { ba00ff0000 8bc1 23c2 3bc2 }
            // n = 4, score = 2400
            //   ba00ff0000           | push                eax
            //   8bc1                 | push                4
            //   23c2                 | push                1
            //   3bc2                 | push                eax

        $sequence_4 = { 870b 5f 8bc6 5e 5b c3 }
            // n = 6, score = 2400
            //   870b                 | push                1
            //   5f                   | push                eax
            //   8bc6                 | push                1
            //   5e                   | push                4
            //   5b                   | push                1
            //   c3                   | push                4

        $sequence_5 = { 8b4d08 e8???????? 85c0 7415 ff15???????? 50 }
            // n = 6, score = 2400
            //   8b4d08               | push                4
            //   e8????????           |                     
            //   85c0                 | push                1
            //   7415                 | push                eax
            //   ff15????????         |                     
            //   50                   | push                4

        $sequence_6 = { a804 7405 e8???????? 803d????????00 7405 }
            // n = 5, score = 2200
            //   a804                 | push                eax
            //   7405                 | push                0
            //   e8????????           |                     
            //   803d????????00       |                     
            //   7405                 | push                0

        $sequence_7 = { 750f 33c9 e8???????? 85c0 7404 33c0 }
            // n = 6, score = 2200
            //   750f                 | push                1
            //   33c9                 | push                eax
            //   e8????????           |                     
            //   85c0                 | push                eax
            //   7404                 | push                0
            //   33c0                 | push                0

        $sequence_8 = { 6a08 68???????? 56 ffd7 85c0 }
            // n = 5, score = 2100
            //   6a08                 | push                eax
            //   68????????           |                     
            //   56                   | push                1
            //   ffd7                 | push                4
            //   85c0                 | push                1

        $sequence_9 = { 7528 68???????? ff15???????? 85c0 7504 }
            // n = 5, score = 2100
            //   7528                 | push                4
            //   68????????           |                     
            //   ff15????????         |                     
            //   85c0                 | push                1
            //   7504                 | push                eax

        $sequence_10 = { ff15???????? a3???????? 85c0 74e7 }
            // n = 4, score = 2100
            //   ff15????????         |                     
            //   a3????????           |                     
            //   85c0                 | mov                 ebx, edx
            //   74e7                 | push                1

        $sequence_11 = { 59 57 8bf0 ff15???????? 8bc6 }
            // n = 5, score = 2000
            //   59                   | push                4
            //   57                   | push                1
            //   8bf0                 | push                eax
            //   ff15????????         |                     
            //   8bc6                 | test                eax, eax

        $sequence_12 = { e8???????? 33d2 b9ff3f0000 f7f1 }
            // n = 4, score = 2000
            //   e8????????           |                     
            //   33d2                 | je                  0xffffffe9
            //   b9ff3f0000           | jne                 0x2a
            //   f7f1                 | test                eax, eax

        $sequence_13 = { 8bc6 8703 3bc6 74f8 }
            // n = 4, score = 1900
            //   8bc6                 | mov                 eax, esi
            //   8703                 | xchg                dword ptr [ebx], eax
            //   3bc6                 | cmp                 eax, esi
            //   74f8                 | je                  0xfffffffa

        $sequence_14 = { 56 6a04 53 57 }
            // n = 4, score = 1800
            //   56                   | jne                 8
            //   6a04                 | push                eax
            //   53                   | test                eax, eax
            //   57                   | je                  0xffffffeb

        $sequence_15 = { 55 8bec 81ec44010000 8d85bcfeffff 50 ff7508 }
            // n = 6, score = 1600
            //   55                   | push                8
            //   8bec                 | push                esi
            //   81ec44010000         | call                edi
            //   8d85bcfeffff         | test                eax, eax
            //   50                   | jne                 0x2a
            //   ff7508               | test                eax, eax

        $sequence_16 = { c1e910 e9???????? 8ac1 c1e904 c0e004 }
            // n = 5, score = 1200
            //   c1e910               | shr                 ecx, 0x10
            //   e9????????           |                     
            //   8ac1                 | mov                 al, cl
            //   c1e904               | shr                 ecx, 4
            //   c0e004               | shl                 al, 4

        $sequence_17 = { 8ac8 240f 80e1f0 80c110 }
            // n = 4, score = 900
            //   8ac8                 | mov                 cl, al
            //   240f                 | and                 al, 0xf
            //   80e1f0               | and                 cl, 0xf0
            //   80c110               | add                 cl, 0x10

        $sequence_18 = { 4053 4883ec20 8364244000 833d????????00 }
            // n = 4, score = 700
            //   4053                 | dec                 eax
            //   4883ec20             | test                ecx, ecx
            //   8364244000           | inc                 eax
            //   833d????????00       |                     

        $sequence_19 = { 4883c430 5f c3 85ff 741e }
            // n = 5, score = 700
            //   4883c430             | cmp                 eax, 0x100
            //   5f                   | jae                 0x22
            //   c3                   | dec                 eax
            //   85ff                 | mov                 ecx, dword ptr [ebx]
            //   741e                 | dec                 eax

        $sequence_20 = { 0f84ff000000 3d00010000 7320 488b0b 4885c9 }
            // n = 5, score = 700
            //   0f84ff000000         | je                  0x105
            //   3d00010000           | cmp                 eax, 0x100
            //   7320                 | jae                 0x22
            //   488b0b               | dec                 eax
            //   4885c9               | mov                 ecx, dword ptr [ebx]

        $sequence_21 = { 4883ec20 488b05???????? 488bda 488bf9 4885c0 7532 }
            // n = 6, score = 700
            //   4883ec20             | je                  0x105
            //   488b05????????       |                     
            //   488bda               | cmp                 eax, 0x100
            //   488bf9               | jae                 0x22
            //   4885c0               | dec                 eax
            //   7532                 | mov                 ecx, dword ptr [ebx]

        $sequence_22 = { 4533c0 488bd6 488bcd 48897c2428 }
            // n = 4, score = 700
            //   4533c0               | dec                 eax
            //   488bd6               | test                ecx, ecx
            //   488bcd               | je                  0x1a
            //   48897c2428           | je                  0x105

    condition:
        7 of them and filesize < 1027072
}
Download all Yara Rules