Advisory: APT29 targets COVID-19 vaccine development
Common Information
Type | Value |
---|---|
UUID | 556f1f02-2a5c-45aa-8d54-4b64ec84b226 |
Fingerprint | e1841977f8ef424e45c68b8747ee899f2128b85ca42e47a872315b24836def25 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | July 9, 2020, 6:42 p.m. |
Added to db | March 10, 2024, 1:56 a.m. |
Last updated | Aug. 31, 2024, 2:38 a.m. |
Headline | Advisory: APT29 targets COVID-19 vaccine development |
Title | Advisory: APT29 targets COVID-19 vaccine development |
Detected Hints/Tags/Attributes | 90/3/139 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 161 | cve-2019-19781 |
|
Details | CVE | 128 | cve-2019-11510 |
|
Details | CVE | 150 | cve-2018-13379 |
|
Details | CVE | 22 | cve-2019-9670 |
|
Details | Domain | 5 | botlib.work |
|
Details | Domain | 6 | botlib.post |
|
Details | Domain | 4 | botlib.new |
|
Details | Domain | 4 | botlib.download |
|
Details | Domain | 5 | agent.sh |
|
Details | Domain | 98 | www.ncsc.gov.uk |
|
Details | Domain | 641 | nvd.nist.gov |
|
Details | Domain | 71 | blogs.jpcert.or.jp |
|
Details | Domain | 17 | www.botconf.eu |
|
Details | File | 4 | botlib.ini |
|
Details | File | 4 | botlib.key |
|
Details | File | 5 | main.zip |
|
Details | File | 8 | malware-wellmes-9b78.html |
|
Details | File | 3 | lets-go-with-a-go-rat-_final.pdf |
|
Details | md5 | 3 | 2b6233eb3e872ff78988f4a8f3f6a3ba |
|
Details | sha1 | 3 | 042a51567eea19d5aca71050b4535d33d2ed43ba |
|
Details | sha256 | 5 | 00654dd07721e7551641f90cba832e98c0acb030e2848e5efc0e1752c067ec07 |
|
Details | sha256 | 5 | 0322c4c2d511f73ab55bf3f43b1b0f152188d7146cc67ff497ad275d9dd1c20f |
|
Details | sha256 | 4 | 03e9adae529155961f1f18212ff70181bde0e3da3d7f22961a6e2b1c9da2dd2e |
|
Details | sha256 | 7 | 0b8e6a11adaa3df120ec15846bb966d674724b6b92eae34d63b665e0698e0193 |
|
Details | sha256 | 7 | 14e9b5e214572cb13ff87727d680633f5ee238259043357c94302654c546cad2 |
|
Details | sha256 | 5 | 1fed2e1b077af08e73fb5ecffd2e5169d5289a825dcaf2d8742bb8030e487641 |
|
Details | sha256 | 4 | 21129ad17800b11cdb36906ba7f6105e3bd1cf44575f77df58ba91640ba0cab9 |
|
Details | sha256 | 5 | 2285a264ffab59ab5a1eb4e2b9bcab9baf26750b6c551ee3094af56a4442ac41 |
|
Details | sha256 | 5 | 2daba469f50cd1b77481e605aeae0f28bf14cedfcd8e4369193e5e04c523bc38 |
|
Details | sha256 | 4 | 49bfff6b91ee71bbf8fd94829391a36b844ffba104c145e01c92732ada52c8ba |
|
Details | sha256 | 6 | 4c8671411da91eb5967f408c2a6ff6baf25ff7c40c65ff45ee33b352a711bf9c |
|
Details | sha256 | 9 | 5ca4a9f6553fea64ad2c724bf71d0fac2b372f9e7ce2200814c98aac647172fb |
|
Details | sha256 | 4 | 797159c202ca41356bee18c5303d37e9d2a43ca43d0ce02e1fd9e7045b925d11 |
|
Details | sha256 | 8 | 7c39841ba409bce4c2c35437ecf043f22910984325c70b9530edf15d826147ee |
|
Details | sha256 | 4 | 84b846a42d94431520d3d2d14262f3d3a5d96762e56b0ae471b853d1603ca403 |
|
Details | sha256 | 6 | 8749c1495af4fd73ccfc84b32f56f5e78549d81feefb0c1d1c3475a74345f6a8 |
|
Details | sha256 | 4 | 92a856a2216e107496ee086e1c8cfe14e15145e7a247539815fd37e5a18b84d9 |
|
Details | sha256 | 5 | 93e9383ae8ad2371d457fc4c1035157d887a84bbfe66fbbb3769c5637de59c75 |
|
Details | sha256 | 7 | 953b5fc9977e2d50f3f72c6ce85e89428937117830c0ed67d468e2d93aa7ec9a |
|
Details | sha256 | 4 | a03a71765b1b0ea7de4fbcb557dcfa995ff9068e92db9b2dada9dd0841203145 |
|
Details | sha256 | 4 | a117b2a904c24df62581500176183fbc282a740e4f11976cdfc01fe664a02292 |
|
Details | sha256 | 4 | a3ca47e1083b93ea90ace1ca30d9ef71163e8a95ee00500cbd3fd021da0c18af |
|
Details | sha256 | 5 | b75a5be703d9ba3721d046db80f62886e10009b455fa5cdfd73ce78f9f53ec5a |
|
Details | sha256 | 6 | bec1981e422c1e01c14511d384a33c9bcc66456c1274bbbac073da825a3f537d |
|
Details | sha256 | 4 | c1a0b73bad4ca30a5c18db56c1cba4f5db75f3d53daf62ddc598aae2933345f3 |
|
Details | sha256 | 5 | d7e7182f498440945fc8351f0e82ad2d5844530ebdba39051d2205b730400381 |
|
Details | sha256 | 4 | dd3da0c596fd699900cdd103f097fe6614ac69787edfa6fa84a8f471ecb836bb |
|
Details | sha256 | 7 | e329607379a01483fc914a47c0062d5a3a8d8d65f777fbad2c5a841a90a0af09 |
|
Details | sha256 | 4 | e3d6057b4c2a7d8fa7250f0781ea6dab4a977551c13fe2f0a86f3519b2aaee7a |
|
Details | sha256 | 5 | f3af394d9c3f68dff50b467340ca59a11a14a3d56361e6cffd1cf2312a7028ad |
|
Details | sha256 | 4 | f622d031207d22c633ccec187a24c50980243cb4717d21fad6588dacbf9c29e9 |
|
Details | sha256 | 7 | fd3969d32398bbe3709e9da5f8326935dde664bbc36753bd41a0b111712c0950 |
|
Details | sha256 | 7 | 83014ab5b3f63b0253cdab6d715f5988ac9014570fa4ab2b267c7cf9ba237d18 |
|
Details | sha256 | 8 | 0c5ad1e8fe43583e279201cdb1046aea742bae59685e6da24e963a41df987494 |
|
Details | sha256 | 7 | 58d8e65976b53b77645c248bfa18c3b87a6ecfb02f306fe6ba4944db96a5ede2 |
|
Details | sha256 | 8 | 65495d173e305625696051944a36a031ea94bb3a4f13034d8be740982bc4ab75 |
|
Details | sha256 | 7 | a4b790ddffb3d2e6691dcacae08fb0bfa1ae56b6c73d70688b097ffa831af064 |
|
Details | IPv4 | 6 | 103.216.221.19 |
|
Details | IPv4 | 5 | 103.103.128.221 |
|
Details | IPv4 | 5 | 103.13.240.46 |
|
Details | IPv4 | 5 | 103.205.8.72 |
|
Details | IPv4 | 5 | 103.253.41.102 |
|
Details | IPv4 | 5 | 103.253.41.68 |
|
Details | IPv4 | 5 | 103.253.41.82 |
|
Details | IPv4 | 5 | 103.253.41.90 |
|
Details | IPv4 | 5 | 103.73.188.101 |
|
Details | IPv4 | 5 | 111.90.146.143 |
|
Details | IPv4 | 5 | 111.90.150.176 |
|
Details | IPv4 | 5 | 119.160.234.163 |
|
Details | IPv4 | 5 | 119.160.234.194 |
|
Details | IPv4 | 5 | 119.81.173.130 |
|
Details | IPv4 | 5 | 119.81.178.105 |
|
Details | IPv4 | 5 | 120.53.12.132 |
|
Details | IPv4 | 5 | 122.114.197.185 |
|
Details | IPv4 | 5 | 122.114.226.172 |
|
Details | IPv4 | 5 | 141.255.164.29 |
|
Details | IPv4 | 5 | 141.98.212.55 |
|
Details | IPv4 | 5 | 145.249.107.73 |
|
Details | IPv4 | 5 | 146.0.76.37 |
|
Details | IPv4 | 5 | 149.202.12.210 |
|
Details | IPv4 | 5 | 169.239.128.110 |
|
Details | IPv4 | 5 | 176.119.29.37 |
|
Details | IPv4 | 5 | 178.211.39.6 |
|
Details | IPv4 | 5 | 185.120.77.166 |
|
Details | IPv4 | 5 | 185.145.128.35 |
|
Details | IPv4 | 6 | 185.99.133.112 |
|
Details | IPv4 | 5 | 191.101.180.78 |
|
Details | IPv4 | 5 | 192.48.88.107 |
|
Details | IPv4 | 5 | 193.182.144.105 |
|
Details | IPv4 | 5 | 202.59.9.59 |
|
Details | IPv4 | 6 | 209.58.186.196 |
|
Details | IPv4 | 5 | 209.58.186.197 |
|
Details | IPv4 | 5 | 209.58.186.240 |
|
Details | IPv4 | 5 | 220.158.216.130 |
|
Details | IPv4 | 5 | 27.102.130.115 |
|
Details | IPv4 | 5 | 31.170.107.186 |
|
Details | IPv4 | 5 | 31.7.63.141 |
|
Details | IPv4 | 5 | 45.120.156.69 |
|
Details | IPv4 | 3 | 45.123.190.167 |
|
Details | IPv4 | 6 | 45.123.190.168 |
|
Details | IPv4 | 5 | 45.152.84.57 |
|
Details | IPv4 | 5 | 46.19.143.69 |
|
Details | IPv4 | 5 | 5.199.174.164 |
|
Details | IPv4 | 5 | 66.70.247.215 |
|
Details | IPv4 | 5 | 79.141.168.109 |
|
Details | IPv4 | 5 | 81.17.17.213 |
|
Details | IPv4 | 6 | 85.93.2.116 |
|
Details | IPv4 | 6 | 119.81.184.11 |
|
Details | IPv4 | 4 | 185.225.226.16 |
|
Details | IPv4 | 5 | 188.241.68.137 |
|
Details | IPv4 | 4 | 45.129.229.48 |
|
Details | Threat Actor Identifier - APT | 665 | APT29 |
|
Details | Url | 3 | https://www.ncsc.gov.uk/news/citrix-alert |
|
Details | Url | 3 | https://www.ncsc.gov.uk/news/alert-vpn-vulnerabilities |
|
Details | Url | 3 | https://nvd.nist.gov/vuln/detail/cve-2019-9670 |
|
Details | Url | 8 | https://blogs.jpcert.or.jp/en/2018/07/malware-wellmes-9b78.html |
|
Details | Url | 3 | https://www.botconf.eu/wp-content/uploads/2018/12/2018-y-ishikawa-s-nagano- |
|
Details | Url | 4 | https://www.ncsc.gov.uk/guidance/mitigating-malware. |
|
Details | Url | 4 | https://www.ncsc.gov.uk/guidance/multi-factor-authentication-online- |
|
Details | Url | 1 | https://www.ncsc.gov.uk/guidance/setting-two-factor-authentication-2fa |
|
Details | Url | 5 | https://www.ncsc.gov.uk/phishing |
|
Details | Url | 4 | https://www.ncsc.gov.uk/guidance/introduction-logging-security- |
|
Details | Url | 4 | https://www.ncsc.gov.uk/guidance/preventing-lateral-movement |
|
Details | Yara rule | 1 | rule wellmess_dotnet_unique_strings { meta: description = "Rule to detect WellMess .NET samples based on unique strings and function/variable names" author = "NCSC" hash = "2285a264ffab59ab5a1eb4e2b9bcab9baf26750b6c551ee3094af56a4442ac41" strings: $s1 = "MaxPostSize" wide $s2 = "HealthInterval" wide $s3 = "Hello from Proxy" wide $s4 = "Start bot:" wide $s5 = "Choise" ascii wide $s7 = "FromNormalToBase64" $s8 = "FromBase64ToNormal" $s9 = "ConvBytesToWords" $s10 = "WellMess" $s11 = "chunksM" condition: uint16(0) == 0x5a4d and uint16(uint16(0x3c)) == 0x4550 and 3 of them } |
|
Details | Yara rule | 1 | rule wellmess_botlib_function_names { meta: description = "Rule to detect WellMess Golang samples based on the function names used by the actor" author = "NCSC" hash = "8749c1495af4fd73ccfc84b32f56f5e78549d81feefb0c1d1c3475a74345f6a8" strings: $s1 = "botlib.wellMess" ascii wide $s2 = "botlib.saveFile" ascii wide $s3 = "botlib.reply" ascii wide $s4 = "botlib.init" ascii wide $s5 = "botlib.generateRandomString" ascii wide $s6 = "botlib.encrypt" ascii wide $s7 = "botlib.deleteFile" ascii wide $s8 = "botlib.convertFromString" ascii wide $s9 = "botlib.chunksM" ascii wide $s10 = "botlib.Work" ascii wide $s11 = "botlib.UnpackB" ascii wide $s12 = "botlib.Unpack" ascii wide $s13 = "botlib.UDFile" ascii wide $s14 = "botlib.Split" ascii wide $s15 = "botlib.Service" ascii wide $s16 = "botlib.SendMessage" ascii wide $s17 = "botlib.Send.func1" ascii wide $s18 = "botlib.Send" ascii wide $s19 = "botlib.ReceiveMessage" ascii wide $s20 = "botlib.RandStringBytes" ascii wide $s21 = "botlib.RandInt" ascii wide $s22 = "botlib.Post" ascii wide $s23 = "botlib.Parse" ascii wide $s24 = "botlib.Pad" ascii wide $s25 = "botlib.Pack" ascii wide $s26 = "botlib.New" ascii wide $s27 = "botlib.KeySizeError.Error" ascii wide $s28 = "botlib.Key" ascii wide $s29 = "botlib.Join" ascii wide $s30 = "botlib.GetRandomBytes" ascii wide $s31 = "botlib.GenerateSymmKey" ascii wide $s32 = "botlib.FromNormalToBase64" ascii wide $s33 = "botlib.EncryptText" ascii wide $s34 = "botlib.Download" ascii wide $s35 = "botlib.Decipher" ascii wide $s36 = "botlib.Command" ascii wide $s37 = "botlib.Cipher" ascii wide $s38 = "botlib.CalculateMD5Hash" ascii wide $s39 = "botlib.Base64ToNormal" ascii wide $s40 = "botlib.AES_Encrypt" ascii wide $s41 = "botlib.AES_Decrypt" ascii wide $s42 = "botlib.(*rc6cipher).Encrypt" ascii wide $s43 = "botlib.(*rc6cipher).Decrypt" ascii wide $s44 = "botlib.(*rc6cipher).BlockSize" ascii wide $s45 = "botlib.(*KeySizeError).Error" ascii wide $s46 = "botlib.DownloadDNS" ascii wide $s47 = "botlib.JoinDnsChunks" ascii wide $s48 = "botlib.SendDNS" ascii wide $s49 = "botlib.CreateDNSName" ascii wide condition: ((uint16(0) == 0x5a4d and uint16(uint16(0x3c)) == 0x4550) or uint32(0) == 0x464c457f) and any of them } |
|
Details | Yara rule | 3 | rule wellmess_certificate_base64_snippets { meta: description = "Rule for detection of WellMess based on base64 snippets of certificates used" author = "NCSC" hash = "8749c1495af4fd73ccfc84b32f56f5e78549d81feefb0c1d1c3475a74345f6a8" strings: $a1 = "BgNVHQ4EBwQFAQIDBA" $a2 = "YDVR0OBAcEBQECAwQG" $a3 = "GA1UdDgQHBAUBAgMEB" $b1 = "BgNVBAYTBVR1bmlzMQswCQYDVQQKEwJJVD" $b2 = "YDVQQGEwVUdW5pczELMAkGA1UEChMCSVQx" $b3 = "GA1UEBhMFVHVuaXMxCzAJBgNVBAoTAklUM" condition: ((uint16(0) == 0x5a4d and uint16(uint16(0x3c)) == 0x4550) or uint32(0) == 0x464c457f) and any of ($a*) and any of ($b*) } |
|
Details | Yara rule | 1 | rule wellmess_regex_used_for_parsing_beacons { meta: description = "Detects WellMess Golang and .NET samples based on the regex they used to parse commands and beacon information" author = "NCSC" hash = "8749c1495af4fd73ccfc84b32f56f5e78549d81feefb0c1d1c3475a74345f6a8" strings: $a = "fileName:(?<fn>.*?)\\sargs:(?<arg>.*)\\snotwait:(?<nw>.*)" ascii wide $b = "<;(?<key>[^;]*?);>(?<value>[^<]*?)<;[^;]*?;>" ascii wide condition: ((uint16(0) == 0x5a4d and uint16(uint16(0x3c)) == 0x4550) or uint32(0) == 0x464c457f) and any of them } |
|
Details | Yara rule | 1 | rule wellmail_unique_strings { meta: description = "Rule for detection of WellMail based on unique strings contained in the binary" author = "NCSC" hash = "0c5ad1e8fe43583e279201cdb1046aea742bae59685e6da24e963a41df987494" strings: $a = "C:\\Server\\Mail\\App_Data\\Temp\\agent.sh\\src" $b = "C:/Server/Mail/App_Data/Temp/agent.sh/src/main.go" $c = "HgQdbx4qRNv" $d = "042a51567eea19d5aca71050b4535d33d2ed43ba" $e = "main.zipit" $f = "@[^\\s]+?\\s(?P<tar>.*?)\\s" condition: uint32(0) == 0x464C457F and 3 of them } |
|
Details | Yara rule | 3 | rule wellmail_certificate_base64_snippets { meta: description = "Rule for detection of WellMail based on base64 snippets of certificates used" author = "NCSC" hash = "0c5ad1e8fe43583e279201cdb1046aea742bae59685e6da24e963a41df987494" strings: $a1 = "BgNVHQ4EBwQFAQIDBA" $a2 = "YDVR0OBAcEBQECAwQG" $a3 = "GA1UdDgQHBAUBAgMEB" $b1 = "BgNVBAoTE0dNTyBHbG9iYWxTaWduLCBJbm" $b2 = "YDVQQKExNHTU8gR2xvYmFsU2lnbiwgSW5j" $b3 = "GA1UEChMTR01PIEdsb2JhbFNpZ24sIEluY" condition: uint32(0) == 0x464C457F and any of ($a*) and any of ($b*) } |
|
Details | Yara rule | 1 | rule sorefang_directory_enumeration_output_strings { meta: description = "Rule to detect SoreFang based on formatted string output for directory enumeration" author = "NCSC" hash = "58d8e65976b53b77645c248bfa18c3b87a6ecfb02f306fe6ba4944db96a5ede2" strings: $ = "----------All usres directory----------" $ = "----------Desktop directory----------" $ = "----------Documents directory----------" condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and any of them } |
|
Details | Yara rule | 1 | rule sorefang_encryption_key_2b62 { meta: description = "Rule to detect SoreFang based on hardcoded encryption key" author = "NCSC" hash = "58d8e65976b53b77645c248bfa18c3b87a6ecfb02f306fe6ba4944db96a5ede2" strings: $ = "2b6233eb3e872ff78988f4a8f3f6a3ba" condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and any of them } |
|
Details | Yara rule | 1 | rule sorefang_encryption_key_schedule { meta: description = "Rule to detect SoreFang based on the key schedule used for encryption" author = "NCSC" hash = "58d8e65976b53b77645c248bfa18c3b87a6ecfb02f306fe6ba4944db96a5ede2" strings: $ = { C7 05 ?? ?? ?? ?? 63 51 E1 B7 B8 BC D1 3B 01 8B 48 FC 81 E9 47 86 C8 61 89 08 83 C0 04 3D ?? ?? ?? ?? 7E EB 33 D2 33 C9 B8 2C 00 00 00 89 55 D4 33 F6 89 4D D8 33 DB 3B F8 0F 4F C7 8D 04 40 89 45 D0 83 F8 01 7C 4F 0F 1F 80 00 00 00 00 } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and any of them } |
|
Details | Yara rule | 3 | rule sorefang_command_elem_cookie_ga_boundary_string { meta: description = "Rule to detect SoreFang based on scheduled task element and Cookie header/boundary strings" author = "NCSC" hash = "58d8e65976b53b77645c248bfa18c3b87a6ecfb02f306fe6ba4944db96a5ede2" strings: $ = "<Command>" wide $ = "Cookie:_ga=" $ = "------974767299852498929531610575" condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and 2 of them } |
|
Details | Yara rule | 1 | rule sorefang_encryption_round_function { meta: description = "Rule to detect SoreFang based on the encryption round function" author = "NCSC" hash = "58d8e65976b53b77645c248bfa18c3b87a6ecfb02f306fe6ba4944db96a5ede2" strings: $ = { 8A E9 8A FB 8A 5D 0F 02 C9 88 45 0F FE C1 0F BE C5 88 6D F3 8D 14 45 01 00 00 00 0F AF D0 0F BE C5 0F BE C9 0F AF C8 C1 FA 1B C0 E1 05 0A D1 8B 4D EC 0F BE C1 89 55 E4 8D 14 45 01 00 00 00 0F AF D0 8B C1 } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and any of them } |
|
Details | Yara rule | 1 | rule sorefang_add_random_commas_spaces { meta: description = "Rule to detect SoreFang based on function that adds commas and spaces" author = "NCSC" hash = "58d8e65976b53b77645c248bfa18c3b87a6ecfb02f306fe6ba4944db96a5ede2" strings: $ = { E8 ?? ?? ?? ?? B9 06 00 00 00 99 F7 F9 8B CE 83 FA 04 7E 09 6A 02 68 ?? ?? ?? ?? EB 07 6A 01 68 ?? ?? ?? ?? } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and any of them } |
|
Details | Yara rule | 1 | rule sorefang_modify_alphabet_custom_encode { meta: description = "Rule to detect SoreFang based on arguments passed into custom encoding algorithm function" author = "NCSC" hash = "58d8e65976b53b77645c248bfa18c3b87a6ecfb02f306fe6ba4944db96a5ede2" strings: $ = { 33 C0 8B CE 6A 36 6A 71 66 89 46 60 88 46 62 89 46 68 66 89 46 64 } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and any of them } |
|
Details | Yara rule | 3 | rule sorefang_custom_encode_decode { meta: description = "Rule to detect SoreFang based on the custom encoding/decoding algorithm function" author = "NCSC" hash = "58d8e65976b53b77645c248bfa18c3b87a6ecfb02f306fe6ba4944db96a5ede2" strings: $ = { 55 8B EC 8B D1 53 56 8B 75 08 8B DE 80 42 62 FA 8A 4A 62 66 D3 EB 57 3A 5A 5C 74 0F } $ = { 3A 5A 5D 74 0A 3A 5A 58 74 05 3A 5A 59 75 05 FE C1 88 4A 62 8A 4A 62 B8 01 00 00 00 } $ = { 8A 46 62 84 C0 74 3E 3C 06 73 12 0F B6 C0 B9 06 00 00 00 2B C8 C6 46 62 06 66 D3 66 60 0F B7 4E 60 } $ = { 80 3C 38 0D 0F 84 93 01 00 00 C6 42 62 06 8B 56 14 83 FA 10 72 04 8B 06 } $ = { 0F BE 0C 38 8B 45 EC 0F B6 40 5B 3B C8 75 07 8B 55 EC B3 3E } $ = { 0F BE 0C 38 8B 45 EC 0F B6 40 5E 3B C8 75 0B 8B 55 EC D0 EB C6 42 62 05 } $ = { 8B 55 EC 0F BE 04 38 0F B6 DB 0F B6 4A 5F 3B C1 B8 3F 00 00 00 0F 44 D8 } $ = { 8A 4A 62 66 8B 52 60 66 D3 E2 0F B6 C3 66 0B D0 8B 45 EC 66 89 50 60 8A 45 F3 02 C1 88 45 F3 3C 08 72 2E 04 F8 8A C8 88 45 F3 66 D3 EA 8B 4D 08 0F B6 C2 50 } $ = { 3A 5A 5C 74 0F 3A 5A 5D 74 0A 3A 5A 58 74 05 3A 5A 59 75 05 FE C1 88 4A 62 } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and any of them } |
|
Details | Yara rule | 1 | rule sorefang_remove_chars_comma_space_dot { meta: description = "Rule to detect SoreFang based on function that removes commas, spaces and dots" author = "NCSC" hash = "58d8e65976b53b77645c248bfa18c3b87a6ecfb02f306fe6ba4944db96a5ede2" strings: $ = { 8A 18 80 FB 2C 74 03 88 19 41 42 40 3B D6 75 F0 8B 5D 08 } $ = { 8A 18 80 FB 2E 74 03 88 19 41 42 40 3B D6 75 F0 8B 5D 08 } $ = { 8A 18 80 FB 20 74 03 88 19 41 42 40 3B D6 75 F0 8B 5D 08 } condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and all of them } |
|
Details | Yara rule | 1 | rule sorefang_disk_enumeration_strings { meta: description = "Rule to detect SoreFang based on disk enumeration strings" author = "NCSC" hash = "a4b790ddffb3d2e6691dcacae08fb0bfa1ae56b6c73d70688b097ffa831af064" strings: $ = "\x0D\x0AFree on disk: " $ = "Total disk: " $ = "Error in GetDiskFreeSpaceEx\x0D\x0A" $ = "\x0D\x0AVolume label: " $ = "Serial number: " $ = "File system: " $ = "Error in GetVolumeInformation\x0D\x0A" $ = "I can not het information about this disk\x0D\x0A" condition: (uint16(0) == 0x5A4D and uint16(uint32(0x3c)) == 0x4550) and all of them } |