Task Information
| Task ID: | 27fabfa2-c115-11ed-866d-42010aa4000b |
| File name: | 4d2861b3f36fb9558cdf4e207d157ee0 |
| Task parameters: | ClamAV scan: | True |
| Unpack: | False |
| Share file: | True |
ClamAV Results
The file matched the following open source and commercial ClamAV rules.
YARA Results
Static Analysis
The following YARA rules matched on the file (static analysis).
| Rule name: | adonunix2
|
| Author: | Tim Brown @timb_machine |
| Description: | AD on UNIX |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
| Rule name: | APT_APT29_NOBELIUM_Stageless_Loader_May21_2
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects stageless loader as used by APT29 / NOBELIUM |
| Reference: | https://www.microsoft.com/security/blog/2021/05/28/breaking-down-nobeliums-latest-early-stage-toolset/ |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | APT_APT29_sorefang_custom_encode_decode
|
| Author: | NCSC |
| Description: | Rule to detect SoreFang based on the custom encoding/decoding algorithm function |
| Reference: | https://www.ncsc.gov.uk/news/advisory-apt29-targets-covid-19-vaccine-development |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | APT_APT41_POISONPLUG_2
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects APT41 malware POISONPLUG |
| Reference: | https://www.fireeye.com/blog/threat-research/2019/08/apt41-dual-espionage-and-cyber-crime-operation.html |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | APT_APT41_POISONPLUG_2_RID2D9F
|
| Author: | Florian Roth |
| Description: | Detects APT41 malware POISONPLUG |
| Reference: | https://www.fireeye.com/blog/threat-research/2019/08/apt41-dual-espionage-and-cyber-crime-operation.html |
| TLP: | TLP:WHITE |
| Rule name: | APT_ATP28_Sofacy_Indicators_May19_1
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects APT28 Sofacy indicators in samples |
| Reference: | https://twitter.com/cyb3rops/status/1129647994603790338 |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | apt_equation_exploitlib_mutexes
|
| Description: | Rule to detect Equation group's Exploitation library http://goo.gl/ivt8EW |
| Reference: | http://securelist.com/blog/research/68750/equation-the-death-star-of-malware-galaxy/ |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | APT_MAL_CN_Wocao_getos_py
|
| Author: | Fox-IT SRT |
| Description: | Python getos utility |
| Reference: | https://www.fox-it.com/en/news/whitepapers/operation-wocao-shining-a-light-on-one-of-chinas-hidden-hacking-groups/ |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | ATM_Malware_DispenserXFS
|
| Author: | @Xylit0l @r3c0nst / Modified by Florian Roth |
| Description: | Detects ATM Malware DispenserXFS |
| Reference: | https://twitter.com/r3c0nst/status/1100775857306652673 |
| TLP: | TLP:WHITE |
| Repository: | fboldewin |
| Rule name: | AutoIT_Compiled
|
| Author: | @bartblaze |
| Description: | Identifies compiled AutoIT script (as EXE). |
| TLP: | TLP:WHITE |
| Repository: | bartblaze |
| Rule name: | BergSilva_Malware
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects a malware from the same author as the Indetectables RAT |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | BergSilva_Malware_RID2DB8
|
| Author: | Florian Roth |
| Description: | Detects a malware from the same author as the Indetectables RAT |
| Reference: | - |
| TLP: | TLP:WHITE |
| Rule name: | BernhardPOS
|
| Author: | Nick Hoffman / Jeremy Humble |
| Description: | BernhardPOS Credit Card dumping tool |
| Reference: | http://morphick.com/blog/2015/7/14/bernhardpos-new-pos-malware-discovered-by-morphick |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | BeyondExec_RemoteAccess_Tool
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects BeyondExec Remote Access Tool - file rexesvr.exe |
| Reference: | https://goo.gl/BvYurS |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | BeyondExec_RemoteAccess_Tool_RID3211
|
| Author: | Florian Roth |
| Description: | Detects BeyondExec Remote Access Tool - file rexesvr.exe |
| Reference: | https://goo.gl/BvYurS |
| TLP: | TLP:WHITE |
| Rule name: | Codoso_Gh0st_1
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Codoso APT Gh0st Malware |
| Reference: | https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | Codoso_Gh0st_1_RID2C2D
|
| Author: | Florian Roth |
| Description: | Detects Codoso APT Gh0st Malware |
| Reference: | https://www.proofpoint.com/us/exploring-bergard-old-malware-new-tricks |
| TLP: | TLP:WHITE |
| Rule name: | crime_win32_ransom_maze_dll_1
|
| Author: | @VK_Intel |
| Description: | Detects Maze ransomware payload dll unpacked |
| Reference: | https://twitter.com/VK_Intel/status/1251388507219726338 |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | DeepPanda_htran_exe
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Hack Deep Panda - htran-exe |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | DeepPanda_sl_txt_packed
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Hack Deep Panda - ScanLine sl-txt-packed |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | DeepPanda_sl_txt_packed_RID3037
|
| Author: | Florian Roth |
| Description: | Hack Deep Panda - FBI Liaison Alert System # A-000049-MW - ScanLine sl-txt-packed |
| Reference: | http://krebsonsecurity.com/wp-content/uploads/2015/02/FBI-Flash-Warning-Deep-Panda.pdf |
| TLP: | TLP:WHITE |
| Rule name: | Disable_Defender
|
| Author: | iam-py-test |
| Description: | Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
| Rule name: | dsc
|
| Author: | Aaron DeVera |
| Description: | Discord domains |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
| Rule name: | Duqu2_Sample4
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Duqu2 Malware |
| Reference: | https://securelist.com/blog/research/70504/the-mystery-of-duqu-2-0-a-sophisticated-cyberespionage-actor-returns/ |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | Enfal_Malware_Backdoor
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Generic Rule to detect the Enfal Malware |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | EquationDrug_HDDSSD_Op
|
| Author: | Florian Roth (Nextron Systems) @4nc4p |
| Description: | EquationDrug - HDD/SSD firmware operation - nls_933w.dll |
| Reference: | http://securelist.com/blog/research/69203/inside-the-equationdrug-espionage-platform/ |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | EquationDrug_HDDSSD_Op_RID2F20
|
| Author: | Florian Roth |
| Description: | EquationDrug - HDD/SSD firmware operation - nls_933w.dll |
| Reference: | http://securelist.com/blog/research/69203/inside-the-equationdrug-espionage-platform/ |
| TLP: | TLP:WHITE |
| Rule name: | EquationGroup_nethide_Lp
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | EquationGroup Malware - file nethide_Lp.dll |
| Reference: | https://goo.gl/tcSoiJ |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | EquationGroup_nethide_Lp_RID30BF
|
| Author: | Florian Roth |
| Description: | EquationGroup Malware - file nethide_Lp.dll |
| Reference: | https://goo.gl/tcSoiJ |
| TLP: | TLP:WHITE |
| Rule name: | Exploit_MS15_077_078
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | MS15-078 / MS15-077 exploit - generic signature |
| Reference: | https://code.google.com/p/google-security-research/issues/detail?id=473&can=1&start=200 |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | Exploit_MS15_077_078_RID2D56
|
| Author: | Florian Roth |
| Description: | MS15-078 / MS15-077 exploit - generic signature |
| Reference: | https://code.google.com/p/google-security-research/issues/detail?id=473&can=1&start=200 |
| TLP: | TLP:WHITE |
| Rule name: | FiveEyes_QUERTY_Malwaresig_20123_sys
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | FiveEyes QUERTY Malware - file 20123.sys.bin |
| Reference: | http://www.spiegel.de/media/media-35668.pdf |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | HackTool_MSIL_SharPersist_2
|
| Author: | FireEye |
| Reference: | https://www.fireeye.com/blog/products-and-services/2020/12/fireeye-shares-details-of-recent-cyber-attack-actions-to-protect-community.html |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | HackTool_MSIL_SharPivot_3
|
| Author: | FireEye |
| Description: | This rule looks for .NET PE files that have the strings of various method names in the SharPivot code. |
| Reference: | https://www.fireeye.com/blog/products-and-services/2020/12/fireeye-shares-details-of-recent-cyber-attack-actions-to-protect-community.html |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | HKTL_Meterpreter_inMemory
|
| Author: | netbiosX, Florian Roth |
| Description: | Detects Meterpreter in-memory |
| Reference: | https://www.reddit.com/r/purpleteamsec/comments/hjux11/meterpreter_memory_indicators_detection_tooling/ |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | HKTL_NET_GUID_clr_meterpreter
|
| Author: | Arnim Rupp |
| Description: | Detects c# red/black-team tools via typelibguid |
| Reference: | https://github.com/OJ/clr-meterpreter |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | HKTL_NET_GUID_DeviceGuardBypasses
|
| Author: | Arnim Rupp |
| Description: | Detects c# red/black-team tools via typelibguid |
| Reference: | https://github.com/tyranid/DeviceGuardBypasses |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | HKTL_NET_GUID_OffensiveCSharp
|
| Author: | Arnim Rupp |
| Description: | Detects c# red/black-team tools via typelibguid |
| Reference: | https://github.com/diljith369/OffensiveCSharp |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | HKTL_NET_GUID_Pen_Test_Tools
|
| Author: | Arnim Rupp |
| Description: | Detects c# red/black-team tools via typelibguid |
| Reference: | https://github.com/awillard1/Pen-Test-Tools |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | HKTL_NET_GUID_SharpC2
|
| Author: | Arnim Rupp |
| Description: | Detects c# red/black-team tools via typelibguid |
| Reference: | https://github.com/SharpC2/SharpC2 |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | HKTL_RedMimicry_Agent
|
| Author: | mirar@chaosmail.org |
| Description: | matches the RedMimicry agent executable and payload |
| Reference: | https://redmimicry.com |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | HKTL_Unknown_Feb19_1
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detetcs a tool used in the Australian Parliament House network compromise |
| Reference: | https://twitter.com/cyb3rops/status/1097423665472376832 |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | HKTL_Unknown_Feb19_1_RID2DF9
|
| Author: | Florian Roth |
| Description: | Detetcs a tool used in the Australian Parliament House network compromise |
| Reference: | https://twitter.com/cyb3rops/status/1097423665472376832 |
| TLP: | TLP:WHITE |
| Rule name: | iKAT_tools_nmap
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Generic rule for NMAP - based on NMAP 4 standalone |
| Reference: | http://ikat.ha.cked.net/Windows/functions/ikatfiles.html |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | IMPLANT_3_v1
|
| Author: | US CERT |
| Description: | X-Agent/CHOPSTICK Implant by APT28 |
| Reference: | https://www.us-cert.gov/ncas/current-activity/2017/02/10/Enhanced-Analysis-GRIZZLY-STEPPE |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | IMPLANT_4_v11
|
| Author: | US CERT |
| Description: | BlackEnergy / Voodoo Bear Implant by APT28 |
| Reference: | https://www.us-cert.gov/ncas/current-activity/2017/02/10/Enhanced-Analysis-GRIZZLY-STEPPE |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | IMPLANT_4_v4
|
| Author: | US CERT |
| Description: | BlackEnergy / Voodoo Bear Implant by APT28 |
| Reference: | https://www.us-cert.gov/ncas/current-activity/2017/02/10/Enhanced-Analysis-GRIZZLY-STEPPE |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | IMPLANT_4_v7
|
| Author: | US CERT |
| Description: | BlackEnergy / Voodoo Bear Implant by APT28 |
| Reference: | https://www.us-cert.gov/ncas/current-activity/2017/02/10/Enhanced-Analysis-GRIZZLY-STEPPE |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | IronTiger_dnstunnel
|
| Author: | Cyber Safety Solutions, Trend Micro |
| Description: | This rule detects a dns tunnel tool used in Operation Iron Tiger |
| Reference: | http://goo.gl/T5fSJC |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | Jupyter_infostealer
|
| Author: | CD_R0M_ |
| Description: | Rule for Jupyter Infostealer/Solarmarker malware from september 2021-December 2022 |
| TLP: | TLP:WHITE |
| Repository: | CD-R0M |
| Rule name: | MAL_IceId_Core_202104
|
| Author: | Thomas Barabosch, Telekom Security |
| Description: | 2021 Bokbot / Icedid core |
| Reference: | https://www.telekom.com/en/blog/group/article/let-s-set-ice-on-fire-hunting-and-detecting-icedid-infections-627240 |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | MAL_Passwordstate_Moserware_Backdoor_Apr21_1
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects backdoor used in Passwordstate incident |
| Reference: | https://thehackernews.com/2021/04/passwordstate-password-manager-update.html |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | MAL_RANSOM_Ragna_Locker_Apr20_1
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Ragna Locker Ransomware |
| Reference: | https://otx.alienvault.com/indicator/file/c2bd70495630ed8279de0713a010e5e55f3da29323b59ef71401b12942ba52f6 |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | MAL_RANSOM_Ragna_Locker_Apr20_1_RID3195
|
| Author: | Florian Roth |
| Description: | Detects Ragna Locker Ransomware |
| Reference: | https://otx.alienvault.com/indicator/file/c2bd70495630ed8279de0713a010e5e55f3da29323b59ef71401b12942ba52f6 |
| TLP: | TLP:WHITE |
| Rule name: | malware_apt15_royaldll
|
| Author: | David Cannings |
| Description: | DLL implant, originally rights.dll and runs as a service |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | Malware_QA_not_copy
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | VT Research QA uploaded malware - file not copy.exe |
| Reference: | VT Research QA |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | Malware_QA_not_copy_RID2E95
|
| Author: | Florian Roth |
| Description: | VT Research QA uploaded malware - file not copy.exe |
| Reference: | VT Research QA |
| TLP: | TLP:WHITE |
| Rule name: | Powerkatz_DLL_Generic
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Powerkatz - a Mimikatz version prepared to run in memory via Powershell (overlap with other Mimikatz versions is possible) |
| Reference: | PowerKatz Analysis |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | Powerkatz_DLL_Generic_RID2F2F
|
| Author: | Florian Roth |
| Description: | Detects Powerkatz - a Mimikatz version prepared to run in memory via Powershell (overlap with other Mimikatz versions is possible) |
| Reference: | PowerKatz Analysis |
| TLP: | TLP:WHITE |
| Rule name: | PowerShell_Mal_HackTool_Gen
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects PowerShell hack tool samples - generic PE loader |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | PowerShell_Mal_HackTool_Gen_RID317C
|
| Author: | Florian Roth |
| Description: | Detects PowerShell hack tool samples - generic PE loader |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Rule name: | PSAttack_EXE
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | PSAttack - Powershell attack tool - file PSAttack.exe |
| Reference: | https://github.com/gdssecurity/PSAttack/releases/ |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | PSAttack_EXE_RID2B4D
|
| Author: | Florian Roth |
| Description: | PSAttack - Powershell attack tool - file PSAttack.exe |
| Reference: | https://github.com/gdssecurity/PSAttack/releases/ |
| TLP: | TLP:WHITE |
| Rule name: | Ransom_LockerGoga_Mar19_1
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects LockerGoga ransomware binaries |
| Reference: | https://www.nrk.no/norge/skreddersydd-dobbeltangrep-mot-hydro-1.14480202 |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | Ransom_LockerGoga_Mar19_1_RID3037
|
| Author: | Florian Roth |
| Description: | Detects LockerGoga ransomware binaries |
| Reference: | https://www.nrk.no/norge/skreddersydd-dobbeltangrep-mot-hydro-1.14480202 |
| TLP: | TLP:WHITE |
| Rule name: | RAT_Imminent
|
| Author: | Kevin Breen <kevin@techanarchy.net> |
| Description: | Detects Imminent RAT |
| Reference: | http://malwareconfig.com/stats/Imminent |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | RAT_LuminosityLink
|
| Author: | Kevin Breen <kevin@techanarchy.net> |
| Description: | Detects LuminosityLink RAT |
| Reference: | http://malwareconfig.com/stats/LuminosityLink |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | RAT_Plasma
|
| Author: | Kevin Breen <kevin@techanarchy.net> |
| Description: | Detects Plasma RAT |
| Reference: | http://malwareconfig.com/stats/Plasma |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | ReflectiveLoader
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects a unspecified hack tool, crack or malware using a reflective loader - no hard match - further investigation recommended |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | reverse_http
|
| Author: | CD_R0M_ |
| Description: | Identify strings with http reversed (ptth) |
| TLP: | TLP:WHITE |
| Repository: | CD-R0M |
| Rule name: | RocketKitten_Keylogger
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Keylogger used in Rocket Kitten APT |
| Reference: | https://goo.gl/SjQhlp |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | sig_238_Glass2k
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Disclosed hacktool set (old stuff) - file Glass2k.exe |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | sig_238_nbtdump
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Disclosed hacktool set (old stuff) - file nbtdump.exe |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | SUSP_Discord_Attachments_URL
|
| Author: | SECUINFRA Falcon Team |
| Description: | Detects a PE file that contains an Discord Attachments URL. This is often used by Malware to download further payloads |
| TLP: | TLP:WHITE |
| Rule name: | SUSP_ENV_Folder_Root_File_Jan23_1
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects suspicious file path pointing to the root of a folder easily accessible via environment variables |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Rule name: | SUSP_Ngrok_URL
|
| Author: | SECUINFRA Falcon Team |
| Description: | Detects a PE file that contains an ngrok.io URL. This can be used as C2 channel |
| TLP: | TLP:WHITE |
| Rule name: | SUSP_PowerShell_Caret_Obfuscation_2
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects powershell keyword obfuscated with carets |
| Reference: | Internal Research |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | SUSP_Websites
|
| Author: | SECUINFRA Falcon Team |
| Description: | Detects the reference of suspicious sites that might be used to download further malware |
| TLP: | TLP:WHITE |
| Repository: | SIFalcon |
| Rule name: | TempRacer
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects privilege escalation tool - file TempRacer.exe |
| Reference: | http://www.darknet.org.uk/2016/03/tempracer-windows-privilege-escalation-tool/ |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | TempRacer_RID2A94
|
| Author: | Florian Roth |
| Description: | Detects privilege escalation tool - file TempRacer_RID2A94.exe |
| Reference: | http://www.darknet.org.uk/2016/03/tempracer-windows-privilege-escalation-tool/ |
| TLP: | TLP:WHITE |
| Rule name: | TidePool_Malware
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects TidePool malware mentioned in Ke3chang report by Palo Alto Networks |
| Reference: | http://goo.gl/m2CXWR |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | TidePool_Malware_RID2D59
|
| Author: | Florian Roth |
| Description: | Detects TidePool malware mentioned in Ke3chang report by Palo Alto Networks |
| Reference: | http://goo.gl/m2CXWR |
| TLP: | TLP:WHITE |
| Rule name: | Tmanger_Family_20210223
|
| Author: | Rintaro Koike (@nao_sec) |
| Description: | Tmanger Family |
| Reference: | https://malpedia.caad.fkie.fraunhofer.de/details/win.tmanger |
| TLP: | TLP:WHITE |
| Repository: | MalwareBazaar |
| Rule name: | UACME_Akagi_2
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects Windows User Account Control Bypass - from files Akagi32.exe, Akagi64.exe |
| Reference: | https://github.com/hfiref0x/UACME |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | UACME_Akagi_2_RID2B49
|
| Author: | Florian Roth |
| Description: | Detects Windows User Account Control Bypass - from files Akagi32.exe, Akagi64.exe |
| Reference: | https://github.com/hfiref0x/UACME |
| TLP: | TLP:WHITE |
| Rule name: | Unauthorized_Proxy_Server_RAT
|
| Author: | US-CERT Code Analysis Team |
| Reference: | https://www.us-cert.gov/HIDDEN-COBRA-North-Korean-Malicious-Cyber-Activity |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | Unidentified_Malware_Two
|
| Author: | US CERT |
| Description: | Unidentified Implant by APT29 |
| Reference: | https://www.us-cert.gov/ncas/current-activity/2017/02/10/Enhanced-Analysis-GRIZZLY-STEPPE |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | WaterBug_fa_malware
|
| Author: | Symantec Security Response |
| Description: | Symantec Waterbug Attack - FA malware variant |
| Reference: | http://t.co/rF35OaAXrl |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | classified |
| Author: | classified |
| TLP : | TLP:GREEN |
| Rule name: | classified |
| Author: | classified |
| TLP : | TLP:GREEN |
| Rule name: | win_dispenserxfs_w0
|
| Author: | @Xylit0l @r3c0nst / Modified by Florian Roth |
| Description: | Detects ATM Malware DispenserXFS |
| Reference: | https://twitter.com/r3c0nst/status/1100775857306652673 |
| TLP: | TLP:WHITE |
| Repository: | Malpedia |
| Rule name: | win_enfal_w0
|
| Author: | Florian Roth |
| Description: | Generic Rule to detect the Enfal Malware |
| TLP: | TLP:WHITE |
| Repository: | Malpedia |
| Rule name: | win_extreme_rat_w0
|
| Author: | Jean-Philippe Teissier / @Jipe_ |
| Description: | Xtrem RAT v3.5 |
| TLP: | TLP:WHITE |
| Repository: | Malpedia |
| Rule name: | win_ghole_w0
|
| Author: | Florian Roth |
| Description: | Detects a operation Woolen-Goldfish sample - http://goo.gl/NpJpVZ |
| Reference: | http://goo.gl/NpJpVZ |
| TLP: | TLP:WHITE |
| Repository: | Malpedia |
| Rule name: | win_iceid_core_202104
|
| Author: | Thomas Barabosch, Telekom Security |
| Description: | 2021 Bokbot / Icedid core |
| TLP: | TLP:WHITE |
| Repository: | Sandnet |
| Rule name: | classified |
| Author: | classified |
| TLP : | TLP:GREEN |
| Rule name: | win_lockergoga_w0
|
| Author: | Florian Roth |
| Description: | Detects LockerGoga ransomware binaries |
| Reference: | https://www.nrk.no/norge/skreddersydd-dobbeltangrep-mot-hydro-1.14480202 |
| TLP: | TLP:WHITE |
| Repository: | Malpedia |
| Rule name: | win_rgdoor_w0
|
| Author: | Florian Roth |
| Description: | Detects RGDoor backdoor used by OilRig group |
| Reference: | https://researchcenter.paloaltonetworks.com/2018/01/unit42-oilrig-uses-rgdoor-iis-backdoor-targets-middle-east/ |
| TLP: | TLP:WHITE |
| Repository: | Malpedia |
| Rule name: | win_royal_dns_w1
|
| Author: | David Cannings |
| Description: | DLL implant, originally rights.dll and runs as a service |
| TLP: | TLP:WHITE |
| Repository: | Malpedia |
| Rule name: | win_woolger_w0
|
| Author: | Florian Roth |
| Description: | Detects Keylogger used in Rocket Kitten APT |
| Reference: | https://goo.gl/SjQhlp |
| TLP: | TLP:WHITE |
| Repository: | Malpedia |
| Rule name: | Win32_Buzus_Softpulse
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Trojan Buzus / Softpulse |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | WoolenGoldfish_Generic_1
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects a operation Woolen-Goldfish sample - http://goo.gl/NpJpVZ |
| Reference: | http://goo.gl/NpJpVZ |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | WoolenGoldfish_Generic_1_RID3061
|
| Author: | Florian Roth |
| Description: | Detects a operation Woolen-Goldfish sample - http://goo.gl/NpJpVZ |
| Reference: | http://goo.gl/NpJpVZ |
| TLP: | TLP:WHITE |
| Rule name: | WoolenGoldfish_Generic_3
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Detects a operation Woolen-Goldfish sample - http://goo.gl/NpJpVZ |
| Reference: | http://goo.gl/NpJpVZ |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
| Rule name: | xRAT
|
| Author: | Kevin Breen <kevin@techanarchy.net> |
| TLP: | TLP:WHITE |
| Repository: | |
| Rule name: | XYZCmd_zip_Folder_XYZCmd
|
| Author: | Florian Roth (Nextron Systems) |
| Description: | Disclosed hacktool set (old stuff) - file XYZCmd.exe |
| TLP: | TLP:WHITE |
| Repository: | Neo23x0 |
Unpacker
The following YARA rules matched on the unpacked file.
Disabled by submitter
Unpacked Files
The following files could be unpacked from this sample.
Disabled by submitter