Cyberwarfare: A deep dive into the latest Gamaredon Espionage Campaign - Yoroi
Common Information
Type Value
UUID 449af73f-9b81-4122-bbb1-7b95b58daf4b
Fingerprint a60712522fe60385
Analysis status DONE
Considered CTI value 2
Text language
Published Feb. 17, 2020, 12:45 p.m.
Added to db Sept. 26, 2022, 9:31 a.m.
Last updated Nov. 14, 2024, 2:04 p.m.
Headline Cyberwarfare: A deep dive into the latest Gamaredon Espionage Campaign
Title Cyberwarfare: A deep dive into the latest Gamaredon Espionage Campaign - Yoroi
Detected Hints/Tags/Attributes 49/3/39
Attributes
Details Type #Events CTI Value
Details Domain 1
win-apu.ddns.net
Details Domain 1
apu.dot
Details Domain 1
get-icons.ddns.net
Details Domain 4
masseffect.space
Details Domain 372
wscript.shell
Details File 1
f.doc
Details File 1
templates.vbs
Details File 1
28847.exe
Details File 1
wuaucltic.exe
Details File 1
-post.php
Details File 3
excelmymacros.txt
Details File 3
wordmacros.txt
Details File 3
indexoffice.vbs
Details File 1
indexoffice.exe
Details File 1
indexoffice.txt
Details File 1
%appdata%\roaming\microsoft\windows\start menu\programs\startup\templates.vbs
Details File 1
autoindex.php
Details sha256 2
76ea98e1861c1264b340cf3748c3ec74473b04d042cd6bfda9ce51d086cb5a1a
Details sha256 2
e2cb06e0a5c14b4c5f58d0e56a1dc10b6a1007cf56c77ae6cb07946c3dfe82d8
Details sha256 4
c1524a4573bc6acbe59e559c2596975c657ae6bbc0b64f943fffca663b98a95f
Details sha256 1
3dfadf9f23b4c5d17a0c5f5e89715d239c832dbe78551da67815e41e2000fdf1
Details sha256 1
def13f94cdf793df3e9b42b168550a09ee906f07f61a3f5c9d25ceca44e8068c
Details sha256 1
86977a785f361d4f26eb3e189293c0e30871de3c93b19653c26a31dd4ed068cc
Details sha256 3
2f310c5b16620d9f6e5d93db52607f21040b4829aa6110e22ac55fab659e9fa1
Details sha256 3
145a61a14ec6d32b105a6279cd943317b41f1d27f21ac64df61bcdd464868edd
Details sha256 1
ad61df516fb038e806d13d9cc968abaf55eae3b52780d20976ed4e0db440d87b
Details sha256 1
f66e820de46bc0d2053c7d24169deb9424f5fdc6973935b108030b03184fcba5
Details sha256 1
40cd2384824ae960a85fc540a763c342c4dc5c9226308d9eb690c98a302fa7a2
Details Url 1
http://win-apu.ddns.net/apu.dot
Details Url 1
http://get-icons.ddns.net/admin-pc_e42caf54//autoindex.php
Details Url 1
http://masseffect.space/<pc_name>_<hex_drive_sn>/post.php
Details Url 1
http://get-icons.ddns.net/apu.dot
Details Url 1
http://masseffect.space
Details Windows Registry Key 18
HKEY_CURRENT_USER\Software\Microsoft\Office
Details Yara rule 1
rule Gamaredon_Campaign_Genuary_2020_Initial_Dropper {
	meta:
		description = "Yara Rule for Gamaredon_f_doc"
		author = "Cybaze Zlab_Yoroi"
		last_updated = "2020-02-14"
		tlp = "white"
		category = "informational"
	strings:
		$a1 = { 4B 03 }
		$a2 = { 8E DA 30 14 DD 57 EA 3F }
		$a3 = { 3B 93 46 0F AF B0 2B 33 }
		$a4 = { 50 4B 03 04 14 00 06 00 08 }
	condition:
		all of them
}
Details Yara rule 1
rule Gamaredon_Campaign_Genuary_2020_Second_Stage {
	meta:
		description = "Yara Rule for Gamaredon_apu_dot"
		author = "Cybaze Zlab_Yoroi"
		last_updated = "2020-02-14"
		tlp = "white"
		category = "informational"
	strings:
		$a1 = "Menu\\Programs\\Startup\\\""
		$a2 = "RandStrinh"
		$a3 = ".txt"
		$a4 = "templates.vbs"
		$a5 = "GET"
		$a6 = "Encode = 1032"
		$a7 = "WShell=CreateObject(\"WScript.Shell\")"
		$a8 = "Security"
		$a9 = "AtEndOfStream"
		$a10 = "GenRandom"
		$a11 = "SaveToFile"
		$a12 = "Sleep"
		$a13 = "WinMgmts:{(Shutdown,RemoteShutdown)}!"
		$a14 = "Scripting"
		$a15 = "//autoindex.php"
	condition:
		11 of ($a*)
}
Details Yara rule 1
rule Gamaredon_Campaign_Genuary_2020_SFX_Stage_1 {
	meta:
		description = "Yara Rule for Gamaredon SFX stage 1"
		author = "Cybaze Zlab_Yoroi"
		last_updated = "2020-02-14"
		tlp = "white"
		category = "informational"
	strings:
		$a1 = { 4D 5A }
		$a2 = { FF 75 FC E8 F2 22 01 00 }
		$a3 = { FE DE DB DB FE D5 D5 D6 F8 }
		$a4 = { 22 C6 24 A8 BE 81 DE 63 }
		$a5 = { CF 4F D0 C3 C0 91 B0 0D }
	condition:
		all of them
}
Details Yara rule 1
rule Gamaredon_Campaign_Genuary_2020_SFX_Stage_2 {
	meta:
		description = "Yara Rule for Gamaredon SFX stage 2"
		author = "Cybaze Zlab_Yoroi"
		last_updated = "2020-02-14"
		tlp = "white"
		category = "informational"
	strings:
		$a1 = { 4D 5A }
		$a2 = { 00 E9 07 D4 FD FF 8B 4D F0 81 }
		$a3 = { B7 AB FE B2 B1 B5 FA 9B 11 80 }
		$a4 = { 81 21 25 E0 38 03 FA F0 AF 11 }
		$a5 = { 0A 39 DF F7 40 8D 7B 44 52 }
	condition:
		all of them
}
Details Yara rule 1
rule Gamaredon_Campaign_Genuary_2020_dot_NET_stage {
	meta:
		description = "Yara Rule for Gamaredon dot NET stage"
		author = "Cybaze Zlab_Yoroi"
		last_updated = "2020-02-14"
		tlp = "white"
		category = "informational"
	strings:
		$a1 = { 4D 5A }
		$a2 = "AssemblyCompanyAttribute"
		$a3 = "GetDrives"
		$a4 = "Aversome"
		$a5 = "TotalMilliseconds"
		$s1 = { 31 01 C6 01 F2 00 29 01 5C 03 76 }
		$s2 = { 79 02 38 03 93 03 B5 03 }
		$s3 = { 00 07 00 00 11 00 00 72 01 }
		$s4 = { CD DF A6 EF 66 0E 44 D7 }
	condition:
		all of ($a*) and 2 of ($s*)
}