win.vegalocker (Back to overview)

VegaLocker

aka: Vega

Delphi-based ransomware.

References
2019-02-11 ⋅ Twitter (@malwrhunterteam)malwrhunterteam
@online{malwrhunterteam:20190211:vegalocker:2828b6f, author = {malwrhunterteam}, title = {{Tweet on VegaLocker}}, date = {2019-02-11}, organization = {Twitter (@malwrhunterteam)}, url = {https://twitter.com/malwrhunterteam/status/1095024267459284992}, language = {English}, urldate = {2020-01-08} } Tweet on VegaLocker
VegaLocker
2019-02-06 ⋅ Twitter (@malwrhunterteam)MalwareHunterTeam
@online{malwarehunterteam:20190206:ransomware:af1a446, author = {MalwareHunterTeam}, title = {{Tweet on Ransomware Sample}}, date = {2019-02-06}, organization = {Twitter (@malwrhunterteam)}, url = {https://twitter.com/malwrhunterteam/status/1093136163836174339}, language = {English}, urldate = {2020-01-13} } Tweet on Ransomware Sample
VegaLocker
Yara Rules
[TLP:WHITE] win_vegalocker_auto (20190204 | autogenerated rule brought to you by yara-signator)
rule win_vegalocker_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2019-11-26"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator 0.1a"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.vegalocker"
        malpedia_version = "20190204"
        malpedia_license = "CC BY-NC-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using yara-signator.
     * The code and documentation / approach will be published in the near future here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */

    strings:
        $sequence_0 = { 8b40f0 b904000000 e8???????? 8b4508 8b40f4 83c00c e8???????? }
            // n = 7, score = 200
            //   8b40f0               | mov                 eax, dword ptr [eax - 0x10]
            //   b904000000           | mov                 ecx, 4
            //   e8????????           |                     
            //   8b4508               | mov                 eax, dword ptr [ebp + 8]
            //   8b40f4               | mov                 eax, dword ptr [eax - 0xc]
            //   83c00c               | add                 eax, 0xc
            //   e8????????           |                     

        $sequence_1 = { 0f84ea000000 2c14 0f84b8010000 2c3c 0f8464020000 }
            // n = 5, score = 200
            //   0f84ea000000         | je                  0xf0
            //   2c14                 | sub                 al, 0x14
            //   0f84b8010000         | je                  0x1be
            //   2c3c                 | sub                 al, 0x3c
            //   0f8464020000         | je                  0x26a

        $sequence_2 = { 8d4df8 8b45fc 8b4040 8bd3 8b38 ff570c 8b45f8 }
            // n = 7, score = 200
            //   8d4df8               | lea                 ecx, [ebp - 8]
            //   8b45fc               | mov                 eax, dword ptr [ebp - 4]
            //   8b4040               | mov                 eax, dword ptr [eax + 0x40]
            //   8bd3                 | mov                 edx, ebx
            //   8b38                 | mov                 edi, dword ptr [eax]
            //   ff570c               | call                dword ptr [edi + 0xc]
            //   8b45f8               | mov                 eax, dword ptr [ebp - 8]

        $sequence_3 = { 89b00c030000 c645fb01 33c0 5a 59 59 648910 }
            // n = 7, score = 200
            //   89b00c030000         | mov                 dword ptr [eax + 0x30c], esi
            //   c645fb01             | mov                 byte ptr [ebp - 5], 1
            //   33c0                 | xor                 eax, eax
            //   5a                   | pop                 edx
            //   59                   | pop                 ecx
            //   59                   | pop                 ecx
            //   648910               | mov                 dword ptr fs:[eax], edx

        $sequence_4 = { 03d2 03c2 0fb655f2 80e20f }
            // n = 4, score = 200
            //   03d2                 | add                 edx, edx
            //   03c2                 | add                 eax, edx
            //   0fb655f2             | movzx               edx, byte ptr [ebp - 0xe]
            //   80e20f               | and                 dl, 0xf

        $sequence_5 = { 8955fc 8bd8 84c9 7409 8b4508 c640fb20 }
            // n = 6, score = 200
            //   8955fc               | mov                 dword ptr [ebp - 4], edx
            //   8bd8                 | mov                 ebx, eax
            //   84c9                 | test                cl, cl
            //   7409                 | je                  0xb
            //   8b4508               | mov                 eax, dword ptr [ebp + 8]
            //   c640fb20             | mov                 byte ptr [eax - 5], 0x20

        $sequence_6 = { 59 eb27 55 e8???????? }
            // n = 4, score = 200
            //   59                   | pop                 ecx
            //   eb27                 | jmp                 0x29
            //   55                   | push                ebp
            //   e8????????           |                     

        $sequence_7 = { eb5b ff442408 43 8b442408 }
            // n = 4, score = 200
            //   eb5b                 | jmp                 0x5d
            //   ff442408             | inc                 dword ptr [esp + 8]
            //   43                   | inc                 ebx
            //   8b442408             | mov                 eax, dword ptr [esp + 8]

        $sequence_8 = { eb47 8bd7 92 e8???????? 8bde 85db 7405 }
            // n = 7, score = 200
            //   eb47                 | jmp                 0x49
            //   8bd7                 | mov                 edx, edi
            //   92                   | xchg                eax, edx
            //   e8????????           |                     
            //   8bde                 | mov                 ebx, esi
            //   85db                 | test                ebx, ebx
            //   7405                 | je                  7

        $sequence_9 = { 83c304 0fb603 8945f0 8b45f0 837c860800 0f844a060000 }
            // n = 6, score = 200
            //   83c304               | add                 ebx, 4
            //   0fb603               | movzx               eax, byte ptr [ebx]
            //   8945f0               | mov                 dword ptr [ebp - 0x10], eax
            //   8b45f0               | mov                 eax, dword ptr [ebp - 0x10]
            //   837c860800           | cmp                 dword ptr [esi + eax*4 + 8], 0
            //   0f844a060000         | je                  0x650

    condition:
        7 of them
}
Download all Yara Rules