SYMBOLCOMMON_NAMEaka. SYNONYMS
win.vohuk (Back to overview)

Vohuk

VTCollection    

There is no description at this point.

References
2022-12-12Github (MalGamy)MalGamy
YARA rule for Vohuk ransomware
Vohuk
2022-12-08FortinetFred Gutierrez, Shunichi Imano
Ransomware Roundup – New Vohuk, ScareCrow, and AERST Variants
AESRT ScareCrow Vohuk
Yara Rules
[TLP:WHITE] win_vohuk_auto (20241030 | Detects win.vohuk.)
rule win_vohuk_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2024-10-31"
        version = "1"
        description = "Detects win.vohuk."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.vohuk"
        malpedia_rule_date = "20241030"
        malpedia_hash = "26e26953c49c8efafbf72a38076855d578e0a2e4"
        malpedia_version = "20241030"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { be8d000000 8b45c4 83c30c 40 }
            // n = 4, score = 100
            //   be8d000000           | mov                 esi, 0x8d
            //   8b45c4               | mov                 eax, dword ptr [ebp - 0x3c]
            //   83c30c               | add                 ebx, 0xc
            //   40                   | inc                 eax

        $sequence_1 = { ba4786ac2e 6a21 e8???????? 57 ffd0 8b0d???????? ba4786ac2e }
            // n = 7, score = 100
            //   ba4786ac2e           | mov                 edx, 0x2eac8647
            //   6a21                 | push                0x21
            //   e8????????           |                     
            //   57                   | push                edi
            //   ffd0                 | call                eax
            //   8b0d????????         |                     
            //   ba4786ac2e           | mov                 edx, 0x2eac8647

        $sequence_2 = { e8???????? 6801000100 6a08 56 ffd0 8b0d???????? ba0decbfd2 }
            // n = 7, score = 100
            //   e8????????           |                     
            //   6801000100           | push                0x10001
            //   6a08                 | push                8
            //   56                   | push                esi
            //   ffd0                 | call                eax
            //   8b0d????????         |                     
            //   ba0decbfd2           | mov                 edx, 0xd2bfec0d

        $sequence_3 = { 8b857cfeffff 668985fcfeffff 8b8578feffff 668985fefeffff 8b8574feffff 66898500ffffff 8b8570feffff }
            // n = 7, score = 100
            //   8b857cfeffff         | mov                 eax, dword ptr [ebp - 0x184]
            //   668985fcfeffff       | mov                 word ptr [ebp - 0x104], ax
            //   8b8578feffff         | mov                 eax, dword ptr [ebp - 0x188]
            //   668985fefeffff       | mov                 word ptr [ebp - 0x102], ax
            //   8b8574feffff         | mov                 eax, dword ptr [ebp - 0x18c]
            //   66898500ffffff       | mov                 word ptr [ebp - 0x100], ax
            //   8b8570feffff         | mov                 eax, dword ptr [ebp - 0x190]

        $sequence_4 = { 8b8570ffffff 668985ccfeffff b8b8000000 668985cefeffff 668985d2feffff 8b856cffffff 668985d4feffff }
            // n = 7, score = 100
            //   8b8570ffffff         | mov                 eax, dword ptr [ebp - 0x90]
            //   668985ccfeffff       | mov                 word ptr [ebp - 0x134], ax
            //   b8b8000000           | mov                 eax, 0xb8
            //   668985cefeffff       | mov                 word ptr [ebp - 0x132], ax
            //   668985d2feffff       | mov                 word ptr [ebp - 0x12e], ax
            //   8b856cffffff         | mov                 eax, dword ptr [ebp - 0x94]
            //   668985d4feffff       | mov                 word ptr [ebp - 0x12c], ax

        $sequence_5 = { c745e49700c500 c745e882008200 c745ec86008000 c745f08f008f00 c745f4d600cd00 c745f8cb008300 c745fc8300f100 }
            // n = 7, score = 100
            //   c745e49700c500       | mov                 dword ptr [ebp - 0x1c], 0xc50097
            //   c745e882008200       | mov                 dword ptr [ebp - 0x18], 0x820082
            //   c745ec86008000       | mov                 dword ptr [ebp - 0x14], 0x800086
            //   c745f08f008f00       | mov                 dword ptr [ebp - 0x10], 0x8f008f
            //   c745f4d600cd00       | mov                 dword ptr [ebp - 0xc], 0xcd00d6
            //   c745f8cb008300       | mov                 dword ptr [ebp - 8], 0x8300cb
            //   c745fc8300f100       | mov                 dword ptr [ebp - 4], 0xf10083

        $sequence_6 = { 03c2 0fbec0 6bc073 040c 02c1 30440dd0 41 }
            // n = 7, score = 100
            //   03c2                 | add                 eax, edx
            //   0fbec0               | movsx               eax, al
            //   6bc073               | imul                eax, eax, 0x73
            //   040c                 | add                 al, 0xc
            //   02c1                 | add                 al, cl
            //   30440dd0             | xor                 byte ptr [ebp + ecx - 0x30], al
            //   41                   | inc                 ecx

        $sequence_7 = { 69c0f6000000 2bc8 81c1cc000000 66318c74ea000000 46 83fe27 72d1 }
            // n = 7, score = 100
            //   69c0f6000000         | imul                eax, eax, 0xf6
            //   2bc8                 | sub                 ecx, eax
            //   81c1cc000000         | add                 ecx, 0xcc
            //   66318c74ea000000     | xor                 word ptr [esp + esi*2 + 0xea], cx
            //   46                   | inc                 esi
            //   83fe27               | cmp                 esi, 0x27
            //   72d1                 | jb                  0xffffffd3

        $sequence_8 = { 6a22 e8???????? 68???????? 53 ffd0 8b7d90 8b7510 }
            // n = 7, score = 100
            //   6a22                 | push                0x22
            //   e8????????           |                     
            //   68????????           |                     
            //   53                   | push                ebx
            //   ffd0                 | call                eax
            //   8b7d90               | mov                 edi, dword ptr [ebp - 0x70]
            //   8b7510               | mov                 esi, dword ptr [ebp + 0x10]

        $sequence_9 = { 8bec 81ec5c080000 8d45a8 ba44000000 56 8bf1 c60000 }
            // n = 7, score = 100
            //   8bec                 | mov                 ebp, esp
            //   81ec5c080000         | sub                 esp, 0x85c
            //   8d45a8               | lea                 eax, [ebp - 0x58]
            //   ba44000000           | mov                 edx, 0x44
            //   56                   | push                esi
            //   8bf1                 | mov                 esi, ecx
            //   c60000               | mov                 byte ptr [eax], 0

    condition:
        7 of them and filesize < 260096
}
[TLP:WHITE] win_vohuk_w0   (20221212 | Detect_Vohuk_ransomware)
rule win_vohuk_w0 {
    meta:
	    description = "Detect_Vohuk_ransomware"
	    author = "@malgamy12"
	    date = "8/12/2022"
	    license = "DRL 1.1"
        hash= "e27b637abe523503b19e6b57b95489ea"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.vohuk"
        malpedia_rule_date = "20221212"
        malpedia_hash = ""
        malpedia_version = "20221212"
        malpedia_sharing = "TLP:WHITE"
                
    strings:
        $p1 = {B8 [4] 8B CE F7 EE C1 FA ?? 8B C2 C1 E8 ?? 03 C2 69 C0 [4] 2B C8 83 C1 ?? 66 31 4C 75 ?? 46 83 FE ?? 72}
        $p2 = {8B 34 B8 BA [4] 0F BE 04 1E 03 F3}
        
    condition:
        uint16(0) == 0x5A4D and all of them
}
Download all Yara Rules