SYMBOLCOMMON_NAMEaka. SYNONYMS
win.zeus_sphinx (Back to overview)

Zeus Sphinx


This family describes the vanilla Zeus-variant that includes TOR (and Polipo proxy). It has an almost 90% overlap with Zeus v2.0.8.9.
Please note that IBM X-Force decided to call win.zloader/win.zeus_openssl "Zeus Sphinx", after mentioning it as "a new version of Zeus Sphinx" in their initial post in August 2016. Malpedia thus lists the alias "Zeus XSphinx" for win.zeus_openssl - the X to refer to IBM X-Force.

Zeus Sphinx on the one hand has the following versioning ("slow increase")
- 2015/09 v1.0.1.0 (Zeus Sphinx size: 1.5 MB)
- 2016/02 v1.0.1.2 (Zeus Sphinx size: 1.5 MB)
- 2016/04 v1.0.2.0 (Zeus Sphinx size: 1.5 MB)

Zeus OpenSSL on the other hand has the following versioning ("fast increase")
- 2016/05 v1.5.4.0 (Zeus OpenSSL size: 1.2 MB)
- 2017/01 v1.14.8.0 (Zeus OpenSSL size: 1.8 MB)
- 2017/01 v1.15.0.0 (Zeus OpenSSL size: 2.2 MB)

References
2015-08-26Security AffairsPierluigi Paganini
@online{paganini:20150826:sphinx:dfbcee8, author = {Pierluigi Paganini}, title = {{Sphinx, a new variant of Zeus available for sale in the underground}}, date = {2015-08-26}, organization = {Security Affairs}, url = {https://securityaffairs.co/wordpress/39592/cyber-crime/sphinx-variant-zeus-trojan.html}, language = {English}, urldate = {2020-01-08} } Sphinx, a new variant of Zeus available for sale in the underground
Zeus Sphinx
2015-08-24DarkMattersBev Robb
@online{robb:20150824:sphinx:314a7b9, author = {Bev Robb}, title = {{Sphinx: New Zeus Variant for Sale on the Black Market}}, date = {2015-08-24}, organization = {DarkMatters}, url = {https://web.archive.org/web/20160130165709/http://darkmatters.norsecorp.com/2015/08/24/sphinx-new-zeus-variant-for-sale-on-the-black-market/}, language = {English}, urldate = {2020-01-13} } Sphinx: New Zeus Variant for Sale on the Black Market
Zeus Sphinx
Yara Rules
[TLP:WHITE] win_zeus_sphinx_auto (20201014 | autogenerated rule brought to you by yara-signator)
rule win_zeus_sphinx_auto {

    meta:
        author = "Felix Bilstein - yara-signator at cocacoding dot com"
        date = "2020-10-14"
        version = "1"
        description = "autogenerated rule brought to you by yara-signator"
        tool = "yara-signator v0.5.0"
        tool_config = "callsandjumps;datarefs;binvalue"
        malpedia_reference = "https://malpedia.caad.fkie.fraunhofer.de/details/win.zeus_sphinx"
        malpedia_rule_date = "20201014"
        malpedia_hash = "a7e3bd57eaf12bf3ea29a863c041091ba3af9ac9"
        malpedia_version = "20201014"
        malpedia_license = "CC BY-SA 4.0"
        malpedia_sharing = "TLP:WHITE"

    /* DISCLAIMER
     * The strings used in this rule have been automatically selected from the
     * disassembly of memory dumps and unpacked files, using YARA-Signator.
     * The code and documentation is published here:
     * https://github.com/fxb-cocacoding/yara-signator
     * As Malpedia is used as data source, please note that for a given
     * number of families, only single samples are documented.
     * This likely impacts the degree of generalization these rules will offer.
     * Take the described generation method also into consideration when you
     * apply the rules in your use cases and assign them confidence levels.
     */


    strings:
        $sequence_0 = { 7e15 50 68d9040000 68???????? 68???????? e9???????? }
            // n = 6, score = 400
            //   7e15                 | jle                 0x17
            //   50                   | push                eax
            //   68d9040000           | push                0x4d9
            //   68????????           |                     
            //   68????????           |                     
            //   e9????????           |                     

        $sequence_1 = { c7476400000000 83c410 83c8ff 837df000 7809 }
            // n = 5, score = 400
            //   c7476400000000       | mov                 dword ptr [edi + 0x64], 0
            //   83c410               | add                 esp, 0x10
            //   83c8ff               | or                  eax, 0xffffffff
            //   837df000             | cmp                 dword ptr [ebp - 0x10], 0
            //   7809                 | js                  0xb

        $sequence_2 = { f60004 7414 68???????? 56 51 }
            // n = 5, score = 400
            //   f60004               | test                byte ptr [eax], 4
            //   7414                 | je                  0x16
            //   68????????           |                     
            //   56                   | push                esi
            //   51                   | push                ecx

        $sequence_3 = { eb06 ff8578ffffff 89c8 8b9d78ffffff 29d0 42 89857cffffff }
            // n = 7, score = 400
            //   eb06                 | jmp                 8
            //   ff8578ffffff         | inc                 dword ptr [ebp - 0x88]
            //   89c8                 | mov                 eax, ecx
            //   8b9d78ffffff         | mov                 ebx, dword ptr [ebp - 0x88]
            //   29d0                 | sub                 eax, edx
            //   42                   | inc                 edx
            //   89857cffffff         | mov                 dword ptr [ebp - 0x84], eax

        $sequence_4 = { db0424 dc0d???????? 83c404 c78424b400000000000000 }
            // n = 4, score = 400
            //   db0424               | fild                dword ptr [esp]
            //   dc0d????????         |                     
            //   83c404               | add                 esp, 4
            //   c78424b400000000000000     | mov    dword ptr [esp + 0xb4], 0

        $sequence_5 = { 8d9c0b78a46ad7 8b4804 899d30ffffff 8b780c 8b5804 }
            // n = 5, score = 400
            //   8d9c0b78a46ad7       | lea                 ebx, [ebx + ecx - 0x28955b88]
            //   8b4804               | mov                 ecx, dword ptr [eax + 4]
            //   899d30ffffff         | mov                 dword ptr [ebp - 0xd0], ebx
            //   8b780c               | mov                 edi, dword ptr [eax + 0xc]
            //   8b5804               | mov                 ebx, dword ptr [eax + 4]

        $sequence_6 = { 0fb78405e8efffff 50 e8???????? 668985dae7ffff 8d4302 83c40c }
            // n = 6, score = 400
            //   0fb78405e8efffff     | movzx               eax, word ptr [ebp + eax - 0x1018]
            //   50                   | push                eax
            //   e8????????           |                     
            //   668985dae7ffff       | mov                 word ptr [ebp - 0x1826], ax
            //   8d4302               | lea                 eax, [ebx + 2]
            //   83c40c               | add                 esp, 0xc

        $sequence_7 = { 56 e8???????? 8d85ecfbffff 890424 }
            // n = 4, score = 400
            //   56                   | push                esi
            //   e8????????           |                     
            //   8d85ecfbffff         | lea                 eax, [ebp - 0x414]
            //   890424               | mov                 dword ptr [esp], eax

        $sequence_8 = { f7db 85c9 8b1424 f7d6 85d2 }
            // n = 5, score = 100
            //   f7db                 | neg                 ebx
            //   85c9                 | test                ecx, ecx
            //   8b1424               | mov                 edx, dword ptr [esp]
            //   f7d6                 | not                 esi
            //   85d2                 | test                edx, edx

        $sequence_9 = { 8b8f40060000 8b975c090000 8b873c060000 894c241c 8b4c244c 89542420 89442418 }
            // n = 7, score = 100
            //   8b8f40060000         | mov                 ecx, dword ptr [edi + 0x640]
            //   8b975c090000         | mov                 edx, dword ptr [edi + 0x95c]
            //   8b873c060000         | mov                 eax, dword ptr [edi + 0x63c]
            //   894c241c             | mov                 dword ptr [esp + 0x1c], ecx
            //   8b4c244c             | mov                 ecx, dword ptr [esp + 0x4c]
            //   89542420             | mov                 dword ptr [esp + 0x20], edx
            //   89442418             | mov                 dword ptr [esp + 0x18], eax

        $sequence_10 = { c0e162 f7de fc f7df 8b3c24 fece 368d30 }
            // n = 7, score = 100
            //   c0e162               | shl                 cl, 0x62
            //   f7de                 | neg                 esi
            //   fc                   | cld                 
            //   f7df                 | neg                 edi
            //   8b3c24               | mov                 edi, dword ptr [esp]
            //   fece                 | dec                 dh
            //   368d30               | lea                 esi, ss:[eax]

        $sequence_11 = { bf00175551 bd00a9ac4e c0e208 8b1c24 }
            // n = 4, score = 100
            //   bf00175551           | mov                 edi, 0x51551700
            //   bd00a9ac4e           | mov                 ebp, 0x4eaca900
            //   c0e208               | shl                 dl, 8
            //   8b1c24               | mov                 ebx, dword ptr [esp]

        $sequence_12 = { f9 c0e1a7 f7da c0e2ef bd80cc047a }
            // n = 5, score = 100
            //   f9                   | stc                 
            //   c0e1a7               | shl                 cl, 0xa7
            //   f7da                 | neg                 edx
            //   c0e2ef               | shl                 dl, 0xef
            //   bd80cc047a           | mov                 ebp, 0x7a04cc80

        $sequence_13 = { f7df f7df f6d1 c0e96d 8b3c24 c0e932 f7d5 }
            // n = 7, score = 100
            //   f7df                 | neg                 edi
            //   f7df                 | neg                 edi
            //   f6d1                 | not                 cl
            //   c0e96d               | shr                 cl, 0x6d
            //   8b3c24               | mov                 edi, dword ptr [esp]
            //   c0e932               | shr                 cl, 0x32
            //   f7d5                 | not                 ebp

        $sequence_14 = { f6d1 368d08 c0e9ec 8b1424 }
            // n = 4, score = 100
            //   f6d1                 | not                 cl
            //   368d08               | lea                 ecx, ss:[eax]
            //   c0e9ec               | shr                 cl, 0xec
            //   8b1424               | mov                 edx, dword ptr [esp]

        $sequence_15 = { ba00e8965d c0ea1e 4e 85c0 fece }
            // n = 5, score = 100
            //   ba00e8965d           | mov                 edx, 0x5d96e800
            //   c0ea1e               | shr                 dl, 0x1e
            //   4e                   | dec                 esi
            //   85c0                 | test                eax, eax
            //   fece                 | dec                 dh

    condition:
        7 of them and filesize < 3268608
}
Download all Yara Rules