PLATINUM
Common Information
Type | Value |
---|---|
UUID | d7b4b9fd-c80e-49a5-b7f4-cfa85ba1d8e0 |
Fingerprint | b7f981cf5356ad67309902bbc27317650c3211e38f52e75e03105da4b6e582cb |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | April 26, 2016, 2:24 p.m. |
Added to db | March 10, 2024, 12:28 a.m. |
Last updated | Oct. 1, 2024, 2:58 p.m. |
Headline | PLATINUM |
Title | PLATINUM |
Detected Hints/Tags/Attributes | 155/3/126 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 30 | cve-2015-2545 |
|
Details | CVE | 11 | cve-2013-7331 |
|
Details | CVE | 4 | cve-2013-1331 |
|
Details | CVE | 7 | cve-2015-2546 |
|
Details | Domain | 1 | mister.nofrillspace.com |
|
Details | Domain | 1 | intent.nofrillspace.com |
|
Details | Domain | 1 | www.police28122011.0fees.net |
|
Details | Domain | 1 | box62.a-inet.net |
|
Details | Domain | 1 | eclipse.a-inet.net |
|
Details | Domain | 1 | joomlastats.a-inet.net |
|
Details | Domain | 1 | updates.joomlastats.co.cc |
|
Details | Domain | 1 | server.joomlastats.co.cc |
|
Details | Domain | 1 | scienceweek.scieron.com |
|
Details | Domain | 1 | mobileworld.darktech.org |
|
Details | Domain | 1 | geocities.efnet.at |
|
Details | Domain | 1 | bpl.blogsite.org |
|
Details | Domain | 1 | wiki.servebbs.net |
|
Details | Domain | 5 | www.yumpu.com |
|
Details | Domain | 5 | plusvic.github.io |
|
Details | File | 1 | bogor.doc |
|
Details | File | 1 | president.doc |
|
Details | File | 2 | ops.doc |
|
Details | File | 3 | 2011.doc |
|
Details | File | 1 | fun.doc |
|
Details | File | 1 | ii.doc |
|
Details | File | 1 | space.gif |
|
Details | File | 1 | mao_2011.doc |
|
Details | File | 1 | indonesia.doc |
|
Details | File | 1 | devices.doc |
|
Details | File | 1 | semboyan_1.doc |
|
Details | File | 1 | pp4x322.dll |
|
Details | File | 8 | resume.docx |
|
Details | File | 2130 | cmd.exe |
|
Details | File | 1 | pk2.exe |
|
Details | File | 33 | 360tray.exe |
|
Details | File | 42 | bdagent.exe |
|
Details | File | 1 | proguard.exe |
|
Details | File | 9 | blackd.exe |
|
Details | File | 7 | blackice.exe |
|
Details | File | 25 | savservice.exe |
|
Details | File | 119 | avp.exe |
|
Details | File | 11 | rstray.exe |
|
Details | File | 1 | cmccore.exe |
|
Details | File | 2 | cmctrayicon.exe |
|
Details | File | 36 | zhudongfangyu.exe |
|
Details | File | 478 | lsass.exe |
|
Details | File | 14 | cacls.exe |
|
Details | File | 212 | winlogon.exe |
|
Details | File | 1122 | svchost.exe |
|
Details | File | 2 | mstbl.dll |
|
Details | File | 2 | fgrps.dll |
|
Details | File | 2 | c:\program files\windows journal\templates\cpl\jnwmon.exe |
|
Details | sha1 | 1 | e9f900b5d01320ccd4990fd322a459d709d43e4b |
|
Details | sha1 | 1 | 9a4e82ba371cd2fedea0b889c879daee7a01e1b1 |
|
Details | sha1 | 1 | 92a3ece981bb5e0a3ee4277f08236c1d38b54053 |
|
Details | sha1 | 1 | 0bc08dca86bd95f43ccc78ef4b27d81f28b4b769 |
|
Details | sha1 | 1 | f4af574124e9020ef3d0a7be9f1e42c2261e97e6 |
|
Details | sha1 | 1 | 1bdc1a0bc995c1beb363b11b71c14324be8577c9 |
|
Details | sha1 | 1 | 2a33542038a85db4911d7b846573f6b251e16b2d |
|
Details | sha1 | 1 | d6a795e839f51c1a5aeabf5c10664936ebbef8ea |
|
Details | sha1 | 1 | f362feedc046899a78c4480c32dda4ea82a3e8c0 |
|
Details | sha1 | 1 | f751cdfaef99c6184f45a563f3d81ff1ada25565 |
|
Details | sha1 | 1 | ff7f949da665ba8ce9fb01da357b51415634eaad |
|
Details | sha1 | 1 | dff2fee984ba9f5a8f5d97582c83fca4fa1fe131 |
|
Details | sha1 | 1 | e0ac2ae221328313a7eee33e9be0924c46e2beb9 |
|
Details | sha1 | 1 | ccaf36c2d02c3c5ca24eeeb7b1eae7742a23a86a |
|
Details | sha1 | 1 | ca3bda30a3cdc15afb78e54fa1bbb9300d268d66 |
|
Details | sha1 | 1 | 2fe3c80e98bbb0cf5a0c4da286cd48ec78130a24 |
|
Details | sha1 | 1 | 09e0dfbb5543c708c0dd6a89fd22bbb96dc4ca1c |
|
Details | sha1 | 1 | 0096a3e0c97b85ca75164f48230ae530c94a2b77 |
|
Details | sha1 | 1 | 6a1412daaa9bdc553689537df0a004d44f8a45fd |
|
Details | sha1 | 1 | d3ad0933e1b114b14c2b3a2c59d7f8a95ea0bcbd |
|
Details | sha1 | 1 | a80051d5ae124fd9e5cc03e699dd91c2b373978b |
|
Details | sha1 | 1 | fa087986697e4117c394c9a58cb9f316b2d9f7d8 |
|
Details | sha1 | 1 | 29cb81dbe491143b2f8b67beaeae6557d8944ab4 |
|
Details | sha1 | 1 | 48b89f61d58b57dba6a0ca857bce97bab636af65 |
|
Details | sha1 | 1 | 6dccf88d89ad7b8611b1bc2e9fb8baea41bdb65a |
|
Details | sha1 | 1 | 3907a9e41df805f912f821a47031164b6636bd04 |
|
Details | sha1 | 1 | 960feeb15a0939ec0b53dcb6815adbf7ac1e7bb2 |
|
Details | sha1 | 1 | 99c08d31af211a0e17f92dd312ec7ca2b9469ecb |
|
Details | sha1 | 1 | dcb6cf7cf7c8fdfc89656a042f81136bda354ba6 |
|
Details | sha1 | 1 | 99dcb148b053f4cef6df5fa1ec5d33971a58bd1e |
|
Details | sha1 | 1 | c1c950bc6a2ad67488e675da4dfc8916831239a7 |
|
Details | sha1 | 1 | 831a5a29d47ab85ee3216d4e75f18d93641a9819 |
|
Details | sha1 | 1 | e18750207ddbd939975466a0e01bd84e75327dda |
|
Details | sha1 | 1 | 3119de80088c52bd8097394092847cd984606c88 |
|
Details | sha1 | 1 | 3acb8fe2a5eb3478b4553907a571b6614eb5455c |
|
Details | sha1 | 1 | 6d1169775a552230302131f9385135d385efd166 |
|
Details | sha1 | 1 | bf944eb70a382bd77ee5b47548ea9a4969de0527 |
|
Details | sha1 | 1 | d807648ddecc4572c7b04405f496d25700e0be6e |
|
Details | sha1 | 1 | 1b542dd0dacfcd4200879221709f5fa9683cdcda |
|
Details | sha1 | 1 | bbd4992ee3f3a3267732151636359cf94fb4575d |
|
Details | sha1 | 1 | 3d17828632e8ff1560f6094703ece5433bc69586 |
|
Details | sha1 | 1 | 2abb8e1e9cac24be474e4955c63108ff86d1a034 |
|
Details | sha1 | 1 | fa083d744d278c6f4865f095cfd2feabee558056 |
|
Details | sha1 | 1 | 3a678b5c9c46b5b87bfcb18306ed50fadfc6372e |
|
Details | sha1 | 1 | 3f2ce812c38ff5ac3d813394291a5867e2cddcf2 |
|
Details | sha1 | 1 | 88ff852b1b8077ad5a19cc438afb2402462fbd1a |
|
Details | sha1 | 1 | 2155c20483528377b5e3fde004bb604198463d29 |
|
Details | sha1 | 1 | dc991ef598825daabd9e70bac92c79154363bab2 |
|
Details | IPv4 | 1 | 200.61.248.8 |
|
Details | IPv4 | 1 | 209.45.65.163 |
|
Details | IPv4 | 1 | 190.96.47.9 |
|
Details | IPv4 | 1 | 192.192.114.1 |
|
Details | IPv4 | 1 | 61.31.203.98 |
|
Details | Url | 1 | https://www.yumpu.com/en/document/view/14255220/alexsyscan13/23. |
|
Details | Url | 1 | https://plusvic.github.io/yara |
|
Details | Yara rule | 1 | rule Trojan_Win32_Platual : Platinum { meta: author = "Microsoft" description = "Installer component" original_sample_sha1 = "e0ac2ae221328313a7eee33e9be0924c46e2beb9" unpacked_sample_sha1 = "ccaf36c2d02c3c5ca24eeeb7b1eae7742a23a86a" activity_group = "Platinum" version = "1.0" last_modified = "2016-04-12" strings: $class_name = "AVCObfuscation" $scrambled_dir = { A8 8B B8 E3 B1 D7 FE 85 51 32 3E C0 F1 B7 73 99 } condition: $class_name and $scrambled_dir } |
|
Details | Yara rule | 1 | rule Trojan_Win32_Plaplex : Platinum { meta: author = "Microsoft" description = "Variant of the JPin backdoor" original_sample_sha1 = "ca3bda30a3cdc15afb78e54fa1bbb9300d268d66" unpacked_sample_sha1 = "2fe3c80e98bbb0cf5a0c4da286cd48ec78130a24" activity_group = "Platinum" version = "1.0" last_modified = "2016-04-12" strings: $class_name1 = "AVCObfuscation" $class_name2 = "AVCSetiriControl" condition: $class_name1 and $class_name2 } |
|
Details | Yara rule | 1 | rule Trojan_Win32_Dipsind_B : Platinum { meta: author = "Microsoft" description = "Dipsind Family" sample_sha1 = "09e0dfbb5543c708c0dd6a89fd22bbb96dc4ca1c" activity_group = "Platinum" version = "1.0" last_modified = "2016-04-12" strings: $frg1 = { 8D 90 04 01 00 00 33 C0 F2 AE F7 D1 2B F9 8B C1 8B F7 8B FA C1 E9 02 F3 A5 8B C8 83 E1 03 F3 A4 8B 4D EC 8B 15 ?? ?? ?? ?? 89 91 ?? 07 00 00 } $frg2 = { 68 A1 86 01 00 C1 E9 02 F3 AB 8B CA 83 E1 03 F3 AA } $frg3 = { C0 E8 07 D0 E1 0A C1 8A C8 32 D0 C0 E9 07 D0 E0 0A C8 32 CA 80 F1 63 } condition: $frg1 and $frg2 and $frg3 } |
|
Details | Yara rule | 1 | rule Trojan_Win32_PlaKeylog_B : Platinum { meta: author = "Microsoft" description = "Keylogger component" original_sample_sha1 = "0096a3e0c97b85ca75164f48230ae530c94a2b77" unpacked_sample_sha1 = "6a1412daaa9bdc553689537df0a004d44f8a45fd" activity_group = "Platinum" version = "1.0" last_modified = "2016-04-12" strings: $hook = { C6 06 FF 46 C6 06 25 } $dasm_engine = { 80 C9 10 88 0E 8A CA 80 E1 07 43 88 56 03 80 F9 05 } condition: $hook and $dasm_engine } |
|
Details | Yara rule | 1 | rule Trojan_Win32_Adupib : Platinum { meta: author = "Microsoft" description = "Adupib SSL Backdoor" original_sample_sha1 = "d3ad0933e1b114b14c2b3a2c59d7f8a95ea0bcbd" unpacked_sample_sha1 = "a80051d5ae124fd9e5cc03e699dd91c2b373978b" activity_group = "Platinum" version = "1.0" last_modified = "2016-04-12" strings: $str1 = "POLL_RATE" $str2 = "OP_TIME(end hour)" $str3 = "%d:TCP:*:Enabled" $str4 = "%s[PwFF_cfg%d]" $str5 = "Fake_GetDlgItemTextW: ***value***=" condition: $str1 and $str2 and $str3 and $str4 and $str5 } |
|
Details | Yara rule | 1 | rule Trojan_Win32_PlaLsaLog : Platinum { meta: author = "Microsoft" description = "Loader / possible incomplete LSA Password Filter" original_sample_sha1 = "fa087986697e4117c394c9a58cb9f316b2d9f7d8" unpacked_sample_sha1 = "29cb81dbe491143b2f8b67beaeae6557d8944ab4" activity_group = "Platinum" version = "1.0" last_modified = "2016-04-12" strings: $str1 = { 8A 1C 01 32 DA 88 1C 01 8B 74 24 0C 41 3B CE 7C EF 5B 5F C6 04 01 00 5E 81 C4 04 01 00 00 C3 } $str2 = "PasswordChangeNotify" condition: $str1 and $str2 } |
|
Details | Yara rule | 1 | rule Trojan_Win32_Plagon : Platinum { meta: author = "Microsoft" description = "Dipsind variant" original_sample_sha1 = "48b89f61d58b57dba6a0ca857bce97bab636af65" unpacked_sample_sha1 = "6dccf88d89ad7b8611b1bc2e9fb8baea41bdb65a" activity_group = "Platinum" version = "1.0" last_modified = "2016-04-12" strings: $str1 = "VPLRXZHTU" $str2 = { 64 6F 67 32 6A 7E 6C } $str3 = "Dqpqftk(Wou\"Isztk)" $str4 = "StartThreadAtWinLogon" condition: $str1 and $str2 and $str3 and $str4 } |
|
Details | Yara rule | 1 | rule Trojan_Win32_Plakelog : Platinum { meta: author = "Microsoft" description = "Raw-input based keylogger" original_sample_sha1 = "3907a9e41df805f912f821a47031164b6636bd04" unpacked_sample_sha1 = "960feeb15a0939ec0b53dcb6815adbf7ac1e7bb2" activity_group = "Platinum" version = "1.0" last_modified = "2016-04-12" strings: $str1 = "<0x02>" wide $str2 = "[CTR-BRK]" wide $str3 = "[/WIN]" wide $str4 = { 8A 16 8A 18 32 DA 46 88 18 8B 15 08 E6 42 00 40 41 3B CA 72 EB 5E 5B } condition: $str1 and $str2 and $str3 and $str4 } |
|
Details | Yara rule | 1 | rule Trojan_Win32_Plainst : Platinum { meta: author = "Microsoft" description = "Installer component" original_sample_sha1 = "99c08d31af211a0e17f92dd312ec7ca2b9469ecb" unpacked_sample_sha1 = "dcb6cf7cf7c8fdfc89656a042f81136bda354ba6" activity_group = "Platinum" version = "1.0" last_modified = "2016-04-12" strings: $str1 = { 66 8B 14 4D 18 50 01 10 8B 45 08 66 33 14 70 46 66 89 54 77 FE 66 83 7C 77 FE 00 75 B7 8B 4D FC 89 41 08 8D 04 36 89 41 0C 89 79 04 } $str2 = { 4B D3 91 49 A1 80 91 42 83 B6 33 28 36 6B 90 97 } condition: $str1 and $str2 } |
|
Details | Yara rule | 1 | rule Trojan_Win32_Plagicom : Platinum { meta: author = "Microsoft" description = "Installer component" original_sample_sha1 = "99dcb148b053f4cef6df5fa1ec5d33971a58bd1e" unpacked_sample_sha1 = "c1c950bc6a2ad67488e675da4dfc8916831239a7" activity_group = "Platinum" version = "1.0" last_modified = "2016-04-12" strings: $str1 = { C6 44 24 ?? 68 C6 44 24 ?? 4D C6 44 24 ?? 53 C6 44 24 ?? 56 C6 44 24 ?? 00 } $str2 = "OUEMM/EMM" $str3 = { 85 C9 7E 08 FE 0C 10 40 3B C1 7C F8 C3 } condition: $str1 and $str2 and $str3 } |
|
Details | Yara rule | 1 | rule Trojan_Win32_Plaklog : Platinum { meta: author = "Microsoft" description = "Hook-based keylogger" original_sample_sha1 = "831a5a29d47ab85ee3216d4e75f18d93641a9819" unpacked_sample_sha1 = "e18750207ddbd939975466a0e01bd84e75327dda" activity_group = "Platinum" version = "1.0" last_modified = "2016-04-12" strings: $str1 = "++[%s^^unknown^^%s]++" $str2 = "vtfs43/emm" $str3 = { 33 C9 39 4C 24 08 7E 10 8B 44 24 04 03 C1 80 00 08 41 3B 4C 24 08 7C F0 C3 } condition: $str1 and $str2 and $str3 } |
|
Details | Yara rule | 1 | rule Trojan_Win32_Plapiio : Platinum { meta: author = "Microsoft" description = "JPin backdoor" original_sample_sha1 = "3119de80088c52bd8097394092847cd984606c88" unpacked_sample_sha1 = "3acb8fe2a5eb3478b4553907a571b6614eb5455c" activity_group = "Platinum" version = "1.0" last_modified = "2016-04-12" strings: $str1 = "ServiceMain" $str2 = "Startup" $str3 = { C6 45 ?? 68 C6 45 ?? 4D C6 45 ?? 53 C6 45 ?? 56 C6 45 ?? 6D C6 45 ?? 6D } condition: $str1 and $str2 and $str3 } |
|
Details | Yara rule | 1 | rule Trojan_Win32_Plabit : Platinum { meta: author = "Microsoft" description = "Installer component" sample_sha1 = "6d1169775a552230302131f9385135d385efd166" activity_group = "Platinum" version = "1.0" last_modified = "2016-04-12" strings: $str1 = { 4B D3 91 49 A1 80 91 42 83 B6 33 28 36 6B 90 97 } $str2 = "GetInstanceW" $str3 = { 8B D0 83 E2 1F 8A 14 0A 30 14 30 40 3B 44 24 04 72 EE } condition: $str1 and $str2 and $str3 } |
|
Details | Yara rule | 1 | rule Trojan_Win32_Placisc2 : Platinum { meta: author = "Microsoft" description = "Dipsind variant" original_sample_sha1 = "bf944eb70a382bd77ee5b47548ea9a4969de0527" unpacked_sample_sha1 = "d807648ddecc4572c7b04405f496d25700e0be6e" activity_group = "Platinum" version = "1.0" last_modified = "2016-04-12" strings: $str1 = { 76 16 8B D0 83 E2 07 8A 4C 14 24 8A 14 18 32 D1 88 14 18 40 3B C7 72 EA } $str2 = "VPLRXZHTU" $str3 = "%d) Command:%s" $str4 = { 0D 0A 2D 2D 2D 2D 2D 09 2D 2D 2D 2D 2D 2D 0D 0A } condition: $str1 and $str2 and $str3 and $str4 } |
|
Details | Yara rule | 1 | rule Trojan_Win32_Placisc3 : Platinum { meta: author = "Microsoft" description = "Dipsind variant" original_sample_sha1 = "1b542dd0dacfcd4200879221709f5fa9683cdcda" unpacked_sample_sha1 = "bbd4992ee3f3a3267732151636359cf94fb4575d" activity_group = "Platinum" version = "1.0" last_modified = "2016-04-12" strings: $str1 = { BA 6E 00 00 00 66 89 95 ?? ?? FF FF B8 73 00 00 00 66 89 85 ?? ?? FF FF B9 64 00 00 00 66 89 8D ?? ?? FF FF BA 65 00 00 00 66 89 95 ?? ?? FF FF B8 6C 00 00 00 } $str2 = "VPLRXZHTU" $str3 = { 8B 44 24 ?? 8A 04 01 41 32 C2 3B CF 7C F2 88 03 } condition: $str1 and $str2 and $str3 } |
|
Details | Yara rule | 1 | rule Trojan_Win32_Placisc4 : Platinum { meta: author = "Microsoft" description = "Installer for Dipsind variant" original_sample_sha1 = "3d17828632e8ff1560f6094703ece5433bc69586" unpacked_sample_sha1 = "2abb8e1e9cac24be474e4955c63108ff86d1a034" activity_group = "Platinum" version = "1.0" last_modified = "2016-04-12" strings: $str1 = { 8D 71 01 8B C6 99 BB 0A 00 00 00 F7 FB 0F BE D2 0F BE 04 39 2B C2 88 04 39 84 C0 74 0A } $str2 = { 6A 04 68 00 20 00 00 68 00 00 40 00 6A 00 FF D5 } $str3 = { C6 44 24 ?? 64 C6 44 24 ?? 6F C6 44 24 ?? 67 C6 44 24 ?? 32 C6 44 24 ?? 6A } condition: $str1 and $str2 and $str3 } |
|
Details | Yara rule | 1 | rule Trojan_Win32_Plakpers : Platinum { meta: author = "Microsoft" description = "Injector / loader component" original_sample_sha1 = "fa083d744d278c6f4865f095cfd2feabee558056" unpacked_sample_sha1 = "3a678b5c9c46b5b87bfcb18306ed50fadfc6372e" activity_group = "Platinum" version = "1.0" last_modified = "2016-04-12" strings: $str1 = "MyFileMappingObject" $str2 = "[%.3u] %s %s %s [%s:" wide $str3 = "%s\\{%s}\\%s" wide condition: $str1 and $str2 and $str3 } |
|
Details | Yara rule | 1 | rule Trojan_Win32_Plainst2 : Platinum { meta: author = "Microsoft" description = "Zc tool" original_sample_sha1 = "3f2ce812c38ff5ac3d813394291a5867e2cddcf2" unpacked_sample_sha1 = "88ff852b1b8077ad5a19cc438afb2402462fbd1a" activity_group = "Platinum" version = "1.0" last_modified = "2016-04-12" strings: $str1 = "Connected [%s:%d]..." $str2 = "reuse possible: %c" $str3 = "] => %d%%\x0a" condition: $str1 and $str2 and $str3 } |
|
Details | Yara rule | 1 | rule Trojan_Win32_Plakpeer : Platinum { meta: author = "Microsoft" description = "Zc tool v2" original_sample_sha1 = "2155c20483528377b5e3fde004bb604198463d29" unpacked_sample_sha1 = "dc991ef598825daabd9e70bac92c79154363bab2" activity_group = "Platinum" version = "1.0" last_modified = "2016-04-12" strings: $str1 = "@@E0020(%d)" wide $str2 = /exit.{0,3}@exit.{0,3}new.{0,3}query.{0,3}rcz.{0,3}scz/ wide $str3 = "---###---" wide $str4 = "---@@@---" wide condition: $str1 and $str2 and $str3 and $str4 } |