There is no description at this point.
rule win_virut_auto { meta: author = "Felix Bilstein - yara-signator at cocacoding dot com" date = "2023-01-25" version = "1" description = "Detects win.virut." info = "autogenerated rule brought to you by yara-signator" tool = "yara-signator v0.6.0" signator_config = "callsandjumps;datarefs;binvalue" malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.virut" malpedia_rule_date = "20230124" malpedia_hash = "2ee0eebba83dce3d019a90519f2f972c0fcf9686" malpedia_version = "20230125" malpedia_license = "CC BY-SA 4.0" malpedia_sharing = "TLP:WHITE" /* DISCLAIMER * The strings used in this rule have been automatically selected from the * disassembly of memory dumps and unpacked files, using YARA-Signator. * The code and documentation is published here: * https://github.com/fxb-cocacoding/yara-signator * As Malpedia is used as data source, please note that for a given * number of families, only single samples are documented. * This likely impacts the degree of generalization these rules will offer. * Take the described generation method also into consideration when you * apply the rules in your use cases and assign them confidence levels. */ strings: $sequence_0 = { 8d8424c8000000 50 6804010000 ff15???????? 8d8424c8000000 50 } // n = 6, score = 200 // 8d8424c8000000 | lea eax, [esp + 0xc8] // 50 | push eax // 6804010000 | push 0x104 // ff15???????? | // 8d8424c8000000 | lea eax, [esp + 0xc8] // 50 | push eax $sequence_1 = { 50 50 e8???????? 44 } // n = 4, score = 200 // 50 | push eax // 50 | push eax // e8???????? | // 44 | inc esp $sequence_2 = { ff442414 817c241400000007 0f8cd8fcffff 5f 5e 33c0 5b } // n = 7, score = 200 // ff442414 | inc dword ptr [esp + 0x14] // 817c241400000007 | cmp dword ptr [esp + 0x14], 0x7000000 // 0f8cd8fcffff | jl 0xfffffcde // 5f | pop edi // 5e | pop esi // 33c0 | xor eax, eax // 5b | pop ebx $sequence_3 = { 60 e8???????? 8b542430 5d } // n = 4, score = 200 // 60 | pushal // e8???????? | // 8b542430 | mov edx, dword ptr [esp + 0x30] // 5d | pop ebp $sequence_4 = { 8bcb f3a6 61 7405 47 e2f5 ebc2 } // n = 7, score = 200 // 8bcb | mov ecx, ebx // f3a6 | repe cmpsb byte ptr [esi], byte ptr es:[edi] // 61 | popal // 7405 | je 7 // 47 | inc edi // e2f5 | loop 0xfffffff7 // ebc2 | jmp 0xffffffc4 $sequence_5 = { 52 57 6a44 58 8d9704010000 ab } // n = 6, score = 200 // 52 | push edx // 57 | push edi // 6a44 | push 0x44 // 58 | pop eax // 8d9704010000 | lea edx, [edi + 0x104] // ab | stosd dword ptr es:[edi], eax $sequence_6 = { 8d4704 ab 32e4 ac 66ab } // n = 5, score = 200 // 8d4704 | lea eax, [edi + 4] // ab | stosd dword ptr es:[edi], eax // 32e4 | xor ah, ah // ac | lodsb al, byte ptr [esi] // 66ab | stosw word ptr es:[edi], ax $sequence_7 = { 81ec18040000 53 56 57 6a06 } // n = 5, score = 200 // 81ec18040000 | sub esp, 0x418 // 53 | push ebx // 56 | push esi // 57 | push edi // 6a06 | push 6 $sequence_8 = { 85c0 7416 e314 50 8bd4 6a00 52 } // n = 7, score = 200 // 85c0 | test eax, eax // 7416 | je 0x18 // e314 | jecxz 0x16 // 50 | push eax // 8bd4 | mov edx, esp // 6a00 | push 0 // 52 | push edx $sequence_9 = { 3bf3 0f8e82000000 ff74240c 57 } // n = 4, score = 200 // 3bf3 | cmp esi, ebx // 0f8e82000000 | jle 0x88 // ff74240c | push dword ptr [esp + 0xc] // 57 | push edi $sequence_10 = { 7e24 8b542414 0fb68c04f8050000 69d26d4ec641 40 } // n = 5, score = 200 // 7e24 | jle 0x26 // 8b542414 | mov edx, dword ptr [esp + 0x14] // 0fb68c04f8050000 | movzx ecx, byte ptr [esp + eax + 0x5f8] // 69d26d4ec641 | imul edx, edx, 0x41c64e6d // 40 | inc eax $sequence_11 = { 0f8441020000 6801040000 8d8424fc050000 53 50 } // n = 5, score = 200 // 0f8441020000 | je 0x247 // 6801040000 | push 0x401 // 8d8424fc050000 | lea eax, [esp + 0x5fc] // 53 | push ebx // 50 | push eax $sequence_12 = { 33f6 85ff 7e2c e8???????? } // n = 4, score = 200 // 33f6 | xor esi, esi // 85ff | test edi, edi // 7e2c | jle 0x2e // e8???????? | $sequence_13 = { 6a00 6a05 51 50 53 6a05 } // n = 6, score = 200 // 6a00 | push 0 // 6a05 | push 5 // 51 | push ecx // 50 | push eax // 53 | push ebx // 6a05 | push 5 $sequence_14 = { 03d1 56 ffd2 84c0 } // n = 4, score = 200 // 03d1 | add edx, ecx // 56 | push esi // ffd2 | call edx // 84c0 | test al, al $sequence_15 = { 89442418 3bc3 0f8441020000 6801040000 } // n = 4, score = 200 // 89442418 | mov dword ptr [esp + 0x18], eax // 3bc3 | cmp eax, ebx // 0f8441020000 | je 0x247 // 6801040000 | push 0x401 condition: 7 of them and filesize < 98304 }
If your designated proposal does not fit in any other category, feel free to write a free-text in the comment field below.
Please propose all changes regarding references on the Malpedia library page
Your suggestion will be reviewed before being published. Thank you for contributing!
YYYY-MM-DD
YYYY-MM
YYYY