Concrete signature match: Backdoor - Provides unauthorized remote access for .NET (Microsoft Intermediate Language) platform, family Crysan
This is a concrete detection of Backdoor:MSIL/Crysan.ARA!MTB, a highly sophisticated .NET backdoor. It exhibits rootkit capabilities, leveraging machine learning behavioral analysis, and uses functions like `GetExecutingAssembly` for dynamic code execution or self-inspection to maintain persistence and evade detection.
Relevant strings associated with this threat: - GetExecutingAssembly (PEHSTR_EXT) - gine Shielden v2.4.0.0 (PEHSTR_EXT)
rule Backdoor_MSIL_Crysan_ARA_2147914333_0
{
meta:
author = "threatcheck.sh"
detection_name = "Backdoor:MSIL/Crysan.ARA!MTB"
threat_id = "2147914333"
type = "Backdoor"
platform = "MSIL: .NET intermediate language scripts"
family = "Crysan"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
threshold = "8"
strings_accuracy = "High"
strings:
$x_2_1 = "%RootKit%" wide //weight: 2
$x_3_2 = "$4a2f8fb6-1077-469a-9246-736e6afe8da1" ascii //weight: 3
$x_3_3 = "Client.exe" wide //weight: 3
$x_1_4 = "GetExecutingAssembly" ascii //weight: 1
$x_1_5 = "ToArray" ascii //weight: 1
condition:
(filesize < 20MB) and
(
((2 of ($x_3_*) and 2 of ($x_1_*))) or
((2 of ($x_3_*) and 1 of ($x_2_*))) or
(all of ($x*))
)
}e4c5a5dd0c918e1735a670b8f7164c3619332083b2074a6f6105303ffe83f70d1565682646b8a4dd630ff2fbc37dd696f55132e9e83a0847e4231c471c76754cImmediately isolate any infected systems to prevent further compromise. Perform a full system scan with updated antivirus software to remove the detected malware and any associated components. Investigate and remove persistence mechanisms (e.g., registry run keys, scheduled tasks) and review network logs for suspicious C2 communications. Due to potential rootkit functionality, consider a system re-image for complete eradication.