SYMBOLCOMMON_NAMEaka. SYNONYMS
win.whitebird (Back to overview)

WhiteBird


According to Dr.Web, WhiteBird is a backdoor written in C++ and designed to operate in both 32-bit and 64-bit Microsoft Windows operating systems. The configuration is encrypted with a single byte XOR key. An interesting feature is that the malware can be restricted to operate only within certain "working_hours" with a granularity of one minute.

References
2020-09-25Dr.WebDr.Web
@techreport{drweb:20200925:spear:aeadfac, author = {Dr.Web}, title = {{Spear phishing campaigns threaten Russian fuel and energy companies}}, date = {2020-09-25}, institution = {Dr.Web}, url = {https://st.drweb.com/static/new-www/news/2020/september/tek_rf_article_en.pdf}, language = {English}, urldate = {2020-10-02} } Spear phishing campaigns threaten Russian fuel and energy companies
WhiteBird
2020-07-20Dr.WebDr.Web
@techreport{drweb:20200720:study:442ba99, author = {Dr.Web}, title = {{Study of the APT attacks on state institutions in Kazakhstan and Kyrgyzstan}}, date = {2020-07-20}, institution = {Dr.Web}, url = {https://st.drweb.com/static/new-www/news/2020/july/Study_of_the_APT_attacks_on_state_institutions_in_Kazakhstan_and_Kyrgyzstan_en.pdf}, language = {English}, urldate = {2020-10-02} } Study of the APT attacks on state institutions in Kazakhstan and Kyrgyzstan
Microcin Mirage PlugX WhiteBird
Yara Rules
[TLP:WHITE] win_whitebird_auto (20201023 | autogenerated rule brought to you by yara-signator)
rule win_whitebird_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-12-22"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.6.0"
        signator_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.whitebird"
        malpedia_rule_date = "20201222"
        malpedia_hash = "30354d830a29f0fbd3714d93d94dea941d77a130"
        malpedia_version = "20201023"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { eb09 80f92f 0f95c1 80c13f }
            // n = 4, score = 400
            //   eb09                 | jmp                 0xb
            //   80f92f               | cmp                 cl, 0x2f
            //   0f95c1               | setne               cl
            //   80c13f               | add                 cl, 0x3f

        $sequence_1 = { 8a4302 84c0 7408 3c01 7404 }
            // n = 5, score = 400
            //   8a4302               | mov                 al, byte ptr [ebx + 2]
            //   84c0                 | test                al, al
            //   7408                 | je                  0xa
            //   3c01                 | cmp                 al, 1
            //   7404                 | je                  6

        $sequence_2 = { 8a4301 3c01 7404 3c02 }
            // n = 4, score = 400
            //   8a4301               | mov                 al, byte ptr [ebx + 1]
            //   3c01                 | cmp                 al, 1
            //   7404                 | je                  6
            //   3c02                 | cmp                 al, 2

        $sequence_3 = { 48 7412 48 48 7533 50 68???????? }
            // n = 7, score = 200
            //   48                   | lea                 edi, [ebp - 0x10]
            //   7412                 | stosd               dword ptr es:[edi], eax
            //   48                   | mov                 edi, dword ptr [ebp + 8]
            //   48                   | lea                 eax, [ebp - 0x14]
            //   7533                 | push                eax
            //   50                   | xor                 eax, eax
            //   68????????           |                     

        $sequence_4 = { 4183fc02 0f8582000000 418d5c246e 488d4c2420 33d2 4c8bc3 }
            // n = 6, score = 200
            //   4183fc02             | jne                 0xc8
            //   0f8582000000         | mov                 byte ptr [esp + 0x360], bl
            //   418d5c246e           | dec                 eax
            //   488d4c2420           | cmp                 eax, ebx
            //   33d2                 | je                  0xf
            //   4c8bc3               | dec                 eax

        $sequence_5 = { 59 b9c6000000 8bf8 f3a5 8b4dfc }
            // n = 5, score = 200
            //   59                   | je                  0xc
            //   b9c6000000           | cmp                 al, 1
            //   8bf8                 | mov                 al, byte ptr [ebx + 1]
            //   f3a5                 | cmp                 al, 1
            //   8b4dfc               | je                  8

        $sequence_6 = { 488bcd e8???????? 488b5c2470 488b6c2478 4883c440 415c }
            // n = 6, score = 200
            //   488bcd               | inc                 ecx
            //   e8????????           |                     
            //   488b5c2470           | mov                 eax, 1
            //   488b6c2478           | dec                 eax
            //   4883c440             | mov                 ecx, ebp
            //   415c                 | dec                 eax

        $sequence_7 = { 8b5514 59 59 6a0b }
            // n = 4, score = 200
            //   8b5514               | mov                 ecx, 0xc6
            //   59                   | mov                 edi, eax
            //   59                   | rep movsd           dword ptr es:[edi], dword ptr [esi]
            //   6a0b                 | mov                 ecx, dword ptr [ebp - 4]

        $sequence_8 = { 3817 74f9 498bcd 41b801000000 }
            // n = 4, score = 200
            //   3817                 | cmp                 byte ptr [edi], dl
            //   74f9                 | je                  0xfffffffb
            //   498bcd               | dec                 ecx
            //   41b801000000         | mov                 ecx, ebp

        $sequence_9 = { 8d7df0 ab 8b7d08 8d45ec 50 33c0 }
            // n = 6, score = 200
            //   8d7df0               | cmp                 al, 2
            //   ab                   | jmp                 0xb
            //   8b7d08               | cmp                 cl, 0x2f
            //   8d45ec               | setne               cl
            //   50                   | add                 cl, 0x3f
            //   33c0                 | mov                 al, byte ptr [ebx + 2]

        $sequence_10 = { 8d85f4fdffff 50 6a00 ffb5bcfbffff ff95b4fbffff }
            // n = 5, score = 200
            //   8d85f4fdffff         | test                al, al
            //   50                   | je                  0xc
            //   6a00                 | cmp                 al, 1
            //   ffb5bcfbffff         | je                  0xc
            //   ff95b4fbffff         | pop                 ecx

        $sequence_11 = { 6689442458 8b05???????? 8944245c 83fa01 0f85bb000000 889c2460030000 }
            // n = 6, score = 200
            //   6689442458           | mov                 ebx, dword ptr [esp + 0x70]
            //   8b05????????         |                     
            //   8944245c             | dec                 eax
            //   83fa01               | mov                 ebp, dword ptr [esp + 0x78]
            //   0f85bb000000         | dec                 eax
            //   889c2460030000       | add                 esp, 0x40

        $sequence_12 = { 483bc3 740d 488bc8 e8???????? 488bf8 eb03 }
            // n = 6, score = 200
            //   483bc3               | inc                 ecx
            //   740d                 | pop                 esp
            //   488bc8               | mov                 word ptr [esp + 0x58], ax
            //   e8????????           |                     
            //   488bf8               | mov                 dword ptr [esp + 0x5c], eax
            //   eb03                 | cmp                 edx, 1

    condition:
        7 of them and filesize < 139264
}
Download all Yara Rules