SYMBOLCOMMON_NAMEaka. SYNONYMS
win.virut (Back to overview)

Virut


There is no description at this point.

References
2021-10-27MandiantKen Proska, Corey Hildebrandt, Daniel Kapellmann Zafra, Nathan Brubaker
@online{proska:20211027:portable:437b9c1, author = {Ken Proska and Corey Hildebrandt and Daniel Kapellmann Zafra and Nathan Brubaker}, title = {{Portable Executable File Infecting Malware Is Increasingly Found in OT Networks}}, date = {2021-10-27}, organization = {Mandiant}, url = {https://www.mandiant.com/resources/pe-file-infecting-malware-ot}, language = {English}, urldate = {2021-11-08} } Portable Executable File Infecting Malware Is Increasingly Found in OT Networks
CCleaner Backdoor Floxif neshta Ramnit Sality Virut
2018-11-30Christian J. Dietrich
@online{dietrich:20181130:virut:2b9101c, author = {Christian J. Dietrich}, title = {{Virut Resurrects -- Musings on long-term sinkholing}}, date = {2018-11-30}, url = {https://chrisdietri.ch/post/virut-resurrects/}, language = {English}, urldate = {2019-11-25} } Virut Resurrects -- Musings on long-term sinkholing
Virut
2018-03-01Malwarebyteshasherezade
@online{hasherezade:20180301:blast:6bec8e3, author = {hasherezade}, title = {{Blast from the past: stowaway Virut delivered with Chinese DDoS bot}}, date = {2018-03-01}, organization = {Malwarebytes}, url = {https://blog.malwarebytes.com/threat-analysis/2018/03/blast-from-the-past-stowaway-virut-delivered-with-chinese-ddos-bot/}, language = {English}, urldate = {2019-12-20} } Blast from the past: stowaway Virut delivered with Chinese DDoS bot
Virut
2018-01-10The RegisterRichard Chirgwin
@online{chirgwin:20180110:taiwanese:1ccf7ce, author = {Richard Chirgwin}, title = {{Taiwanese cops give malware-laden USB sticks as prizes for security quiz}}, date = {2018-01-10}, organization = {The Register}, url = {https://www.theregister.co.uk/2018/01/10/taiwanese_police_malware/}, language = {English}, urldate = {2020-01-09} } Taiwanese cops give malware-laden USB sticks as prizes for security quiz
Virut
2013-01-19SpamhausThomas Morrison
@online{morrison:20130119:cooperative:686af83, author = {Thomas Morrison}, title = {{Cooperative Efforts To Shut Down Virut Botnet}}, date = {2013-01-19}, organization = {Spamhaus}, url = {https://www.spamhaus.org/news/article/690/cooperative-efforts-to-shut-down-virut-botnet}, language = {English}, urldate = {2019-12-03} } Cooperative Efforts To Shut Down Virut Botnet
Virut
2013-01-18Brian Krebs
@online{krebs:20130118:polish:d1c0560, author = {Brian Krebs}, title = {{Polish Takedown Targets ‘Virut’ Botnet}}, date = {2013-01-18}, url = {https://krebsonsecurity.com/2013/01/polish-takedown-targets-virut-botnet/}, language = {English}, urldate = {2019-12-18} } Polish Takedown Targets ‘Virut’ Botnet
Virut
2010-06-10Kaspersky LabsVyacheslav Zakorzhevsky
@online{zakorzhevsky:20100610:review:97030aa, author = {Vyacheslav Zakorzhevsky}, title = {{Review of the Virus.Win32.Virut.ce Malware Sample}}, date = {2010-06-10}, organization = {Kaspersky Labs}, url = {https://securelist.com/review-of-the-virus-win32-virut-ce-malware-sample/36305/}, language = {English}, urldate = {2019-12-20} } Review of the Virus.Win32.Virut.ce Malware Sample
Virut
2009-06-23SecureworksJoe Stewart
@online{stewart:20090623:virut:4fecaeb, author = {Joe Stewart}, title = {{Virut Encryption Analysis}}, date = {2009-06-23}, organization = {Secureworks}, url = {https://www.secureworks.com/research/virut-encryption-analysis}, language = {English}, urldate = {2019-11-27} } Virut Encryption Analysis
Virut
Yara Rules
[TLP:WHITE] win_virut_auto (20221125 | Detects win.virut.)
rule win_virut_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2022-11-21"
        version = "1"
        description = "Detects win.virut."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.virut"
        malpedia_rule_date = "20221118"
        malpedia_hash = "e0702e2e6d1d00da65c8a29a4ebacd0a4c59e1af"
        malpedia_version = "20221125"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 54 6804010000 57 ffb42420020000 }
            // n = 4, score = 200
            //   54                   | push                esp
            //   6804010000           | push                0x104
            //   57                   | push                edi
            //   ffb42420020000       | push                dword ptr [esp + 0x220]

        $sequence_1 = { 8d8424d4000000 50 ff15???????? 6800100000 8d842474050000 50 }
            // n = 6, score = 200
            //   8d8424d4000000       | lea                 eax, [esp + 0xd4]
            //   50                   | push                eax
            //   ff15????????         |                     
            //   6800100000           | push                0x1000
            //   8d842474050000       | lea                 eax, [esp + 0x574]
            //   50                   | push                eax

        $sequence_2 = { ebc2 83c70f 57 8bd4 53 8bcc }
            // n = 6, score = 200
            //   ebc2                 | jmp                 0xffffffc4
            //   83c70f               | add                 edi, 0xf
            //   57                   | push                edi
            //   8bd4                 | mov                 edx, esp
            //   53                   | push                ebx
            //   8bcc                 | mov                 ecx, esp

        $sequence_3 = { 3c7a 7702 2c20 aa 3c5c 74ec }
            // n = 6, score = 200
            //   3c7a                 | cmp                 al, 0x7a
            //   7702                 | ja                  4
            //   2c20                 | sub                 al, 0x20
            //   aa                   | stosb               byte ptr es:[edi], al
            //   3c5c                 | cmp                 al, 0x5c
            //   74ec                 | je                  0xffffffee

        $sequence_4 = { 50 33c9 54 51 50 52 51 }
            // n = 7, score = 200
            //   50                   | push                eax
            //   33c9                 | xor                 ecx, ecx
            //   54                   | push                esp
            //   51                   | push                ecx
            //   50                   | push                eax
            //   52                   | push                edx
            //   51                   | push                ecx

        $sequence_5 = { be???????? 8d7c2424 a5 a5 a4 }
            // n = 5, score = 200
            //   be????????           |                     
            //   8d7c2424             | lea                 edi, [esp + 0x24]
            //   a5                   | movsd               dword ptr es:[edi], dword ptr [esi]
            //   a5                   | movsd               dword ptr es:[edi], dword ptr [esi]
            //   a4                   | movsb               byte ptr es:[edi], byte ptr [esi]

        $sequence_6 = { 85f6 745b 50 54 }
            // n = 4, score = 200
            //   85f6                 | test                esi, esi
            //   745b                 | je                  0x5d
            //   50                   | push                eax
            //   54                   | push                esp

        $sequence_7 = { 8d9704010000 51 51 6a02 }
            // n = 4, score = 200
            //   8d9704010000         | lea                 edx, [edi + 0x104]
            //   51                   | push                ecx
            //   51                   | push                ecx
            //   6a02                 | push                2

        $sequence_8 = { 817c241400000007 0f8cd8fcffff 5f 5e 33c0 5b 8be5 }
            // n = 7, score = 200
            //   817c241400000007     | cmp                 dword ptr [esp + 0x14], 0x7000000
            //   0f8cd8fcffff         | jl                  0xfffffcde
            //   5f                   | pop                 edi
            //   5e                   | pop                 esi
            //   33c0                 | xor                 eax, eax
            //   5b                   | pop                 ebx
            //   8be5                 | mov                 esp, ebp

        $sequence_9 = { 59 03f3 8b521c 0fb7044e 03d3 }
            // n = 5, score = 200
            //   59                   | pop                 ecx
            //   03f3                 | add                 esi, ebx
            //   8b521c               | mov                 edx, dword ptr [edx + 0x1c]
            //   0fb7044e             | movzx               eax, word ptr [esi + ecx*2]
            //   03d3                 | add                 edx, ebx

        $sequence_10 = { 3bcf 7e04 8bc7 2bc6 6a00 }
            // n = 5, score = 200
            //   3bcf                 | cmp                 ecx, edi
            //   7e04                 | jle                 6
            //   8bc7                 | mov                 eax, edi
            //   2bc6                 | sub                 eax, esi
            //   6a00                 | push                0

        $sequence_11 = { 8b433c 03c3 8b5078 03d3 8b7220 8b4a18 8d3433 }
            // n = 7, score = 200
            //   8b433c               | mov                 eax, dword ptr [ebx + 0x3c]
            //   03c3                 | add                 eax, ebx
            //   8b5078               | mov                 edx, dword ptr [eax + 0x78]
            //   03d3                 | add                 edx, ebx
            //   8b7220               | mov                 esi, dword ptr [edx + 0x20]
            //   8b4a18               | mov                 ecx, dword ptr [edx + 0x18]
            //   8d3433               | lea                 esi, [ebx + esi]

        $sequence_12 = { 3bf3 0f8e82000000 ff74240c 57 56 ff15???????? 56 }
            // n = 7, score = 200
            //   3bf3                 | cmp                 esi, ebx
            //   0f8e82000000         | jle                 0x88
            //   ff74240c             | push                dword ptr [esp + 0xc]
            //   57                   | push                edi
            //   56                   | push                esi
            //   ff15????????         |                     
            //   56                   | push                esi

        $sequence_13 = { 50 6800040000 8d842404060000 50 }
            // n = 4, score = 200
            //   50                   | push                eax
            //   6800040000           | push                0x400
            //   8d842404060000       | lea                 eax, [esp + 0x604]
            //   50                   | push                eax

        $sequence_14 = { 75b1 ff742418 8b3d???????? ffd7 8d8424d0010000 50 6804010000 }
            // n = 7, score = 200
            //   75b1                 | jne                 0xffffffb3
            //   ff742418             | push                dword ptr [esp + 0x18]
            //   8b3d????????         |                     
            //   ffd7                 | call                edi
            //   8d8424d0010000       | lea                 eax, [esp + 0x1d0]
            //   50                   | push                eax
            //   6804010000           | push                0x104

        $sequence_15 = { 83c004 2bf0 56 8d8404fc050000 50 }
            // n = 5, score = 200
            //   83c004               | add                 eax, 4
            //   2bf0                 | sub                 esi, eax
            //   56                   | push                esi
            //   8d8404fc050000       | lea                 eax, [esp + eax + 0x5fc]
            //   50                   | push                eax

    condition:
        7 of them and filesize < 98304
}
Download all Yara Rules