SYMBOLCOMMON_NAMEaka. SYNONYMS
win.vawtrak (Back to overview)

Vawtrak

aka: Catch, grabnew, NeverQuest

Actor(s): Lunar Spider

URLhaus    

There is no description at this point.

References
2021-09-03Trend MicroMohamad Mokbel
@techreport{mokbel:20210903:state:df86499, author = {Mohamad Mokbel}, title = {{The State of SSL/TLS Certificate Usage in Malware C&C Communications}}, date = {2021-09-03}, institution = {Trend Micro}, url = {https://www.trendmicro.com/content/dam/trendmicro/global/en/research/21/i/ssl-tls-technical-brief/ssl-tls-technical-brief.pdf}, language = {English}, urldate = {2021-09-19} } The State of SSL/TLS Certificate Usage in Malware C&C Communications
AdWind ostap AsyncRAT BazarBackdoor BitRAT Buer Chthonic CloudEyE Cobalt Strike DCRat Dridex FindPOS GootKit Gozi IcedID ISFB Nanocore RAT Orcus RAT PandaBanker Qadars QakBot Quasar RAT Rockloader ServHelper Shifu SManager TorrentLocker TrickBot Vawtrak Zeus Zloader
2020-08-09F5 LabsRemi Cohen, Debbie Walkowski
@online{cohen:20200809:banking:8718999, author = {Remi Cohen and Debbie Walkowski}, title = {{Banking Trojans: A Reference Guide to the Malware Family Tree}}, date = {2020-08-09}, organization = {F5 Labs}, url = {https://www.f5.com/labs/articles/education/banking-trojans-a-reference-guide-to-the-malware-family-tree}, language = {English}, urldate = {2021-06-29} } Banking Trojans: A Reference Guide to the Malware Family Tree
BackSwap Carberp Citadel DanaBot Dridex Dyre Emotet Gozi Kronos PandaBanker Ramnit Shylock SpyEye Tinba TrickBot Vawtrak Zeus
2019-02-15CrowdStrikeBrendon Feeley, Bex Hartley
@online{feeley:20190215:sinful:729f693, author = {Brendon Feeley and Bex Hartley}, title = {{“Sin”-ful SPIDERS: WIZARD SPIDER and LUNAR SPIDER Sharing the Same Web}}, date = {2019-02-15}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/sin-ful-spiders-wizard-spider-and-lunar-spider-sharing-the-same-web/}, language = {English}, urldate = {2019-12-20} } “Sin”-ful SPIDERS: WIZARD SPIDER and LUNAR SPIDER Sharing the Same Web
Dyre IcedID TrickBot Vawtrak LUNAR SPIDER WIZARD SPIDER
2018-08-09Fox-ITAlfred Klason
@online{klason:20180809:bokbot:499f316, author = {Alfred Klason}, title = {{Bokbot: The (re)birth of a banker}}, date = {2018-08-09}, organization = {Fox-IT}, url = {https://blog.fox-it.com/2018/08/09/bokbot-the-rebirth-of-a-banker/}, language = {English}, urldate = {2019-12-20} } Bokbot: The (re)birth of a banker
IcedID Vawtrak
2017-01-22The Hacker NewsMohit Kumar
@online{kumar:20170122:russian:a19c81e, author = {Mohit Kumar}, title = {{Russian Hacker behind 'NeverQuest' Malware, Wanted by FBI, Is Arrested in Spain}}, date = {2017-01-22}, organization = {The Hacker News}, url = {http://thehackernews.com/2017/01/neverquest-fbi-hacker.html}, language = {English}, urldate = {2019-12-18} } Russian Hacker behind 'NeverQuest' Malware, Wanted by FBI, Is Arrested in Spain
Vawtrak
2016-09BluelivBlueliv
@techreport{blueliv:201609:chasing:1c02f62, author = {Blueliv}, title = {{Chasing Cybercrime: Network insights into Vawtrak v2}}, date = {2016-09}, institution = {Blueliv}, url = {https://www.blueliv.com/downloads/network-insights-into-vawtrak-v2.pdf}, language = {English}, urldate = {2020-01-07} } Chasing Cybercrime: Network insights into Vawtrak v2
Vawtrak
2016-07-12Fidelis CybersecurityThreat Research Team
@online{team:20160712:me:d8f4707, author = {Threat Research Team}, title = {{Me and Mr. Robot: Tracking the Actor Behind the MAN1 Crypter}}, date = {2016-07-12}, organization = {Fidelis Cybersecurity}, url = {https://fidelissecurity.com/threatgeek/archive/me-and-mr-robot-tracking-actor-behind-man1-crypter/}, language = {English}, urldate = {2021-07-29} } Me and Mr. Robot: Tracking the Actor Behind the MAN1 Crypter
Hancitor Vawtrak
2016-04-21ThreatpostTom Spring
@online{spring:20160421:pos:008ddcb, author = {Tom Spring}, title = {{PoS Attacks Net Crooks 20 Million Stolen Bank Cards}}, date = {2016-04-21}, organization = {Threatpost}, url = {https://threatpost.com/pos-attacks-net-crooks-20-million-stolen-bank-cards/117595/}, language = {English}, urldate = {2020-01-10} } PoS Attacks Net Crooks 20 Million Stolen Bank Cards
Vawtrak
2014-12-19PhishLabsDon Jackson
@online{jackson:20141219:unrelenting:f3f3ccf, author = {Don Jackson}, title = {{The unrelenting evolution of Vawtrak}}, date = {2014-12-19}, organization = {PhishLabs}, url = {https://info.phishlabs.com/blog/the-unrelenting-evolution-of-vawtrak}, language = {English}, urldate = {2019-11-04} } The unrelenting evolution of Vawtrak
Vawtrak
2014-12-17SecureworksBrett Stone-Gross, Pallav Khandhar
@online{stonegross:20141217:dyre:8486e19, author = {Brett Stone-Gross and Pallav Khandhar}, title = {{Dyre Banking Trojan}}, date = {2014-12-17}, organization = {Secureworks}, url = {https://www.secureworks.com/research/dyre-banking-trojan}, language = {English}, urldate = {2021-05-28} } Dyre Banking Trojan
Dyre Vawtrak WIZARD SPIDER
Yara Rules
[TLP:WHITE] win_vawtrak_auto (20220516 | Detects win.vawtrak.)
rule win_vawtrak_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-05-16"
        version = "1"
        description = "Detects win.vawtrak."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.vawtrak"
        malpedia_rule_date = "20220513"
        malpedia_hash = "7f4b2229e6ae614d86d74917f6d5b41890e62a26"
        malpedia_version = "20220516"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 50 6a00 6a00 e8???????? 50 ff15???????? }
            // n = 6, score = 2600
            //   50                   | lea                 eax, [ecx + 4]
            //   6a00                 | dec                 eax
            //   6a00                 | mov                 dword ptr [esp + 0x28], edi
            //   e8????????           |                     
            //   50                   | mov                 dword ptr [esp + 0x20], 0x10000c
            //   ff15????????         |                     

        $sequence_1 = { 6a01 ff35???????? 6a04 6a01 }
            // n = 4, score = 2600
            //   6a01                 | mov                 dword ptr [esp + 0x28], edi
            //   ff35????????         |                     
            //   6a04                 | mov                 dword ptr [esp + 0x20], 0x10000c
            //   6a01                 | dec                 eax

        $sequence_2 = { 6a04 6a01 50 ff15???????? 85c0 }
            // n = 5, score = 2600
            //   6a04                 | cmp                 eax, dword ptr [ebx + 8]
            //   6a01                 | je                  0xf2
            //   50                   | push                eax
            //   ff15????????         |                     
            //   85c0                 | push                0

        $sequence_3 = { e8???????? 837d1040 752d 8b4d04 e8???????? }
            // n = 5, score = 2400
            //   e8????????           |                     
            //   837d1040             | push                1
            //   752d                 | push                4
            //   8b4d04               | push                1
            //   e8????????           |                     

        $sequence_4 = { e8???????? 85c0 7415 ff15???????? 50 }
            // n = 5, score = 2400
            //   e8????????           |                     
            //   85c0                 | push                1
            //   7415                 | push                eax
            //   ff15????????         |                     
            //   50                   | push                4

        $sequence_5 = { ba00ff0000 8bc1 23c2 3bc2 }
            // n = 4, score = 2400
            //   ba00ff0000           | push                eax
            //   8bc1                 | push                1
            //   23c2                 | push                4
            //   3bc2                 | push                1

        $sequence_6 = { ff15???????? 6800000001 6aff 68???????? }
            // n = 4, score = 2400
            //   ff15????????         |                     
            //   6800000001           | push                1
            //   6aff                 | push                eax
            //   68????????           |                     

        $sequence_7 = { e8???????? eb09 a804 7405 e8???????? 803d????????00 }
            // n = 6, score = 2200
            //   e8????????           |                     
            //   eb09                 | cmp                 eax, edx
            //   a804                 | mov                 eax, esi
            //   7405                 | xchg                dword ptr [ebx], eax
            //   e8????????           |                     
            //   803d????????00       |                     

        $sequence_8 = { b8ff0f0000 6623e8 b800400000 660be8 }
            // n = 4, score = 2200
            //   b8ff0f0000           | cmp                 eax, esi
            //   6623e8               | je                  0xfffffffe
            //   b800400000           | cmp                 al, 0xf
            //   660be8               | ja                  7

        $sequence_9 = { 6a08 68???????? 56 ffd7 85c0 }
            // n = 5, score = 2000
            //   6a08                 | push                eax
            //   68????????           |                     
            //   56                   | push                1
            //   ffd7                 | push                4
            //   85c0                 | push                1

        $sequence_10 = { 7528 68???????? ff15???????? 85c0 7504 33c0 }
            // n = 6, score = 2000
            //   7528                 | push                eax
            //   68????????           |                     
            //   ff15????????         |                     
            //   85c0                 | push                4
            //   7504                 | push                1
            //   33c0                 | push                eax

        $sequence_11 = { ff15???????? a3???????? 85c0 74e7 }
            // n = 4, score = 2000
            //   ff15????????         |                     
            //   a3????????           |                     
            //   85c0                 | push                4
            //   74e7                 | push                1

        $sequence_12 = { 59 57 8bf0 ff15???????? 8bc6 }
            // n = 5, score = 1900
            //   59                   | test                eax, eax
            //   57                   | jne                 8
            //   8bf0                 | push                eax
            //   ff15????????         |                     
            //   8bc6                 | test                eax, eax

        $sequence_13 = { 8bc6 8703 3bc6 74f8 }
            // n = 4, score = 1900
            //   8bc6                 | mov                 eax, esi
            //   8703                 | xchg                dword ptr [ebx], eax
            //   3bc6                 | cmp                 eax, esi
            //   74f8                 | je                  0xfffffffa

        $sequence_14 = { e8???????? 33d2 b9ff3f0000 f7f1 }
            // n = 4, score = 1900
            //   e8????????           |                     
            //   33d2                 | je                  0xffffffeb
            //   b9ff3f0000           | push                eax
            //   f7f1                 | test                eax, eax

        $sequence_15 = { 3c0f 7705 80ea61 eb0a }
            // n = 4, score = 1700
            //   3c0f                 | push                4
            //   7705                 | push                1
            //   80ea61               | push                eax
            //   eb0a                 | test                eax, eax

        $sequence_16 = { c1e910 e9???????? 8ac1 c1e904 c0e004 }
            // n = 5, score = 1200
            //   c1e910               | shr                 ecx, 0x10
            //   e9????????           |                     
            //   8ac1                 | mov                 al, cl
            //   c1e904               | shr                 ecx, 4
            //   c0e004               | shl                 al, 4

        $sequence_17 = { 8ac8 240f 80e1f0 80c110 }
            // n = 4, score = 900
            //   8ac8                 | mov                 cl, al
            //   240f                 | and                 al, 0xf
            //   80e1f0               | and                 cl, 0xf0
            //   80c110               | add                 cl, 0x10

        $sequence_18 = { 3c41 7c11 3c46 7f0d }
            // n = 4, score = 800
            //   3c41                 | cmp                 al, 0x41
            //   7c11                 | jl                  0x13
            //   3c46                 | cmp                 al, 0x46
            //   7f0d                 | jg                  0xf

        $sequence_19 = { 4533c9 4533c0 ff15???????? 48894308 4885c0 7523 488b0b }
            // n = 7, score = 700
            //   4533c9               | inc                 ebp
            //   4533c0               | xor                 eax, eax
            //   ff15????????         |                     
            //   48894308             | dec                 eax
            //   4885c0               | mov                 edx, esi
            //   7523                 | inc                 ebp
            //   488b0b               | xor                 ecx, ecx

        $sequence_20 = { 458d4104 48897c2428 c74424200c001000 ff15???????? }
            // n = 4, score = 700
            //   458d4104             | mov                 dword ptr [ebx + 8], eax
            //   48897c2428           | dec                 eax
            //   c74424200c001000     | test                eax, eax
            //   ff15????????         |                     

        $sequence_21 = { 488905???????? 4885c0 7422 4885db }
            // n = 4, score = 700
            //   488905????????       |                     
            //   4885c0               | inc                 ebp
            //   7422                 | xor                 eax, eax
            //   4885db               | dec                 eax

        $sequence_22 = { 4885c0 74ed 4533c9 4533c0 488bd6 }
            // n = 5, score = 700
            //   4885c0               | dec                 eax
            //   74ed                 | test                eax, eax
            //   4533c9               | je                  0xffffffef
            //   4533c0               | inc                 ebp
            //   488bd6               | xor                 ecx, ecx

    condition:
        7 of them and filesize < 1027072
}
Download all Yara Rules