# Voltron STA **epicturla.com/previous-works/hitb2020-voltron-sta** ### The curious case of 0xFancyFilter The Work of Cyber in the Age of Mechanical Reproduction This talk covers the interesting case of ‘0xFancyFilter’, an amalgam between what could be referred to as Regin 1.5 and Equation Group’s MISTYVEAL. This rare piece of malware is the only documented instance of code overlap between the Regin and Equation Group frameworks and is used to illustrate the difference between stating a relationship between threat actors from public documents vs. being able to show that relationship based on technical findings. The rare –but not at all surprising– collaboration is dubbed the Voltron Supra Threat Actor (STA) as suggested early on by a friendly researcher. ----- [Watch the Talk](https://youtu.be/VnzP00DZlx4) ### Technical Indicators In lieu of a proper write up, the following hashes should help replicate the work by any interested researchers. All samples discussed are available on VirusTotal :) **0xFancyFilter or Regin 1.5 (‘htmlfiltxx64.dll’ or ‘Microsoft\Internet Explorer\iesrch32.dat’)** cd3ee807e349abae65d93e421176f302528b739e9e1d77a6ce4e57caeec91b4e **Older 0xFF samples (‘httpfilt.dll’, ‘htmlfilt.dll’)** 369145c6f366f25a4e8878ad1ffec73d680cdc2da4380b221d1d7cdf3a90c930 ef35705696d78cc9f4de6adad2cbe5ed22fd50da0ce4180c1d47cf0536aebc87 df4bc387181ffaabe0be39e66ef5eb838ed638e0ae2b82e9a7daa83647e38bb1 **Old EQGRP ‘nethdlr’ (MISTYVEAL) for comparison** d8bab0b79bafec3a41db0dd4ae1703c2ab55de5af261e1881d62bde0d9033690 **Regin’s Hopscotch with shared RC4 implementation** d83428779b0c0ebfa08c6b50f34e0f1ae7812eeb9ed78b86610517d8208b6cb3 ----- **YARA** [A broad YARA rule focused on 0xFF features is available HERE](https://raw.githubusercontent.com/juanandresgs/YARA/master/sta_Voltron_0xFancyFilter.yara) Next Next ## HackerHunter: Olympic Destroyer -----