SYMBOLCOMMON_NAMEaka. SYNONYMS
win.whitebird (Back to overview)

WhiteBird


According to Dr.Web, WhiteBird is a backdoor written in C++ and designed to operate in both 32-bit and 64-bit Microsoft Windows operating systems. The configuration is encrypted with a single byte XOR key. An interesting feature is that the malware can be restricted to operate only within certain "working_hours" with a granularity of one minute.

References
2020-09-25Dr.WebDr.Web
@techreport{drweb:20200925:spear:aeadfac, author = {Dr.Web}, title = {{Spear phishing campaigns threaten Russian fuel and energy companies}}, date = {2020-09-25}, institution = {Dr.Web}, url = {https://st.drweb.com/static/new-www/news/2020/september/tek_rf_article_en.pdf}, language = {English}, urldate = {2020-10-02} } Spear phishing campaigns threaten Russian fuel and energy companies
WhiteBird
2020-07-20Dr.WebDr.Web
@techreport{drweb:20200720:study:442ba99, author = {Dr.Web}, title = {{Study of the APT attacks on state institutions in Kazakhstan and Kyrgyzstan}}, date = {2020-07-20}, institution = {Dr.Web}, url = {https://st.drweb.com/static/new-www/news/2020/july/Study_of_the_APT_attacks_on_state_institutions_in_Kazakhstan_and_Kyrgyzstan_en.pdf}, language = {English}, urldate = {2020-10-02} } Study of the APT attacks on state institutions in Kazakhstan and Kyrgyzstan
Microcin Mirage PlugX WhiteBird
Yara Rules
[TLP:WHITE] win_whitebird_auto (20230715 | Detects win.whitebird.)
rule win_whitebird_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2023-07-11"
        version = "1"
        description = "Detects win.whitebird."
        info = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.whitebird"
        malpedia_rule_date = "20230705"
        malpedia_hash = "42d0574f4405bd7d2b154d321d345acb18834a41"
        malpedia_version = "20230715"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 8a4301 3c01 7404 3c02 }
            // n = 4, score = 400
            //   8a4301               | mov                 word ptr [ebp - 0xd4], ax
            //   3c01                 | mov                 eax, edi
            //   7404                 | mov                 word ptr [ebp - 0xd2], ax
            //   3c02                 | xor                 eax, eax

        $sequence_1 = { 8a4302 84c0 7408 3c01 }
            // n = 4, score = 400
            //   8a4302               | mov                 word ptr [ebp - 0xd2], ax
            //   84c0                 | xor                 eax, eax
            //   7408                 | push                0x6d
            //   3c01                 | mov                 word ptr [ebp - 0xd0], ax

        $sequence_2 = { 8a4302 84c0 7408 3c01 7404 3c02 }
            // n = 6, score = 400
            //   8a4302               | je                  0x1e64
            //   84c0                 | xor                 al, al
            //   7408                 | jmp                 0x1eb4
            //   3c01                 | dec                 eax
            //   7404                 | dec                 ecx
            //   3c02                 | mov                 dword ptr [esp + 0xc0], ecx

        $sequence_3 = { eb09 80f92f 0f95c1 80c13f }
            // n = 4, score = 400
            //   eb09                 | jb                  0x1712
            //   80f92f               | cmp                 edi, 0x201
            //   0f95c1               | jge                 0x1712
            //   80c13f               | cmp                 edi, 2

        $sequence_4 = { 8a4302 84c0 7408 3c01 7404 }
            // n = 5, score = 400
            //   8a4302               | test                al, al
            //   84c0                 | jne                 0x133e
            //   7408                 | push                esi
            //   3c01                 | push                dword ptr [ebp + 0xc]
            //   7404                 | call                ebx

        $sequence_5 = { 7412 488d542430 488d0d254b0000 ff15???????? 4c8d4c2430 ba0d000000 }
            // n = 6, score = 200
            //   7412                 | inc                 ecx
            //   488d542430           | mov                 dword ptr [ebx + 0x10], eax
            //   488d0d254b0000       | dec                 eax
            //   ff15????????         |                     
            //   4c8d4c2430           | mov                 eax, dword ptr [ebx + 0x1548]
            //   ba0d000000           | dec                 eax

        $sequence_6 = { 8d8560feffff 50 8d855cfeffff 50 6a00 6a64 8d852cffffff }
            // n = 7, score = 200
            //   8d8560feffff         | lea                 edx, [0xffffb1b9]
            //   50                   | dec                 eax
            //   8d855cfeffff         | lea                 ecx, [esp + 0x60]
            //   50                   | dec                 ecx
            //   6a00                 | cmp                 eax, ebp
            //   6a64                 | jne                 0xa72
            //   8d852cffffff         | dec                 ecx

        $sequence_7 = { 8985a0fbffff 83f8ff 7507 33c0 e9???????? 8d85f4fdffff 8d5002 }
            // n = 7, score = 200
            //   8985a0fbffff         | xor                 edx, edx
            //   83f8ff               | repne scasb         al, byte ptr es:[edi]
            //   7507                 | dec                 eax
            //   33c0                 | not                 ecx
            //   e9????????           |                     
            //   8d85f4fdffff         | dec                 eax
            //   8d5002               | dec                 ecx

        $sequence_8 = { 488bca 498bf8 f2ae 498bfb 48f7d1 4c8d51ff 488bca }
            // n = 7, score = 200
            //   488bca               | mov                 edx, esi
            //   498bf8               | dec                 ecx
            //   f2ae                 | cmp                 eax, esp
            //   498bfb               | je                  0x605
            //   48f7d1               | dec                 eax
            //   4c8d51ff             | lea                 edx, [esp + 0x28]
            //   488bca               | dec                 esp

        $sequence_9 = { 41c1ec04 41c1e402 ff15???????? 440fb7d8 452bdc 442bdf 4585db }
            // n = 7, score = 200
            //   41c1ec04             | lea                 eax, [ebp - 0x20]
            //   41c1e402             | push                eax
            //   ff15????????         |                     
            //   440fb7d8             | push                dword ptr [ebp + 0xc]
            //   452bdc               | push                ebx
            //   442bdf               | add                 esp, 0xc
            //   4585db               | lea                 eax, [ebp - 0x20]

    condition:
        7 of them and filesize < 139264
}
Download all Yara Rules