Concrete signature match: Backdoor - Provides unauthorized remote access for 32-bit Windows platform, family Zegost
Backdoor:Win32/Zegost.AD is a backdoor trojan that provides attackers with remote control over a compromised system. It uses multiple legitimate Windows utilities (Living-off-the-Land techniques) such as PowerShell, BITSAdmin, and Scheduled Tasks to execute code, transfer files, and establish persistence, while employing API hooking to evade detection.
Relevant strings associated with this threat: - |#d4f940ab-401b-4efc-aadc-ad5f3c50688a (NID) - }#d4f940ab-401b-4efc-aadc-ad5f3c50688a (NID) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - bitsadmin (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT)
rule Backdoor_Win32_Zegost_AD_2147656985_0
{
meta:
author = "threatcheck.sh"
detection_name = "Backdoor:Win32/Zegost.AD"
threat_id = "2147656985"
type = "Backdoor"
platform = "Win32: Windows 32-bit platform"
family = "Zegost"
severity = "Critical"
signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
threshold = "11"
strings_accuracy = "Low"
strings:
$x_1_1 = "/stub.dat" ascii //weight: 1
$x_10_2 = {8b d1 83 e2 01 80 fa 01 8a 14 01 75 05 80 f2 ?? eb 03 80 f2 ?? 88 14 01 41 3b ce} //weight: 10, accuracy: Low
condition:
(filesize < 20MB) and
(all of ($x*))
}f154be4057e821d85890232d3737c28140b396dba65db14a0d6b2db554f1d9a8b34966c661b9cf5cfc69dc06f129bd3c9f66a437687564a0a90bbb2e3b41db3bImmediately isolate the affected system from the network to prevent further compromise. Use a reputable security tool to remove the threat. If the system is heavily compromised, re-imaging from a known-good backup is the most reliable solution. Investigate for persistence mechanisms and signs of lateral movement.