Concrete signature match: Password Stealer - Steals credentials and sensitive information for .NET (Microsoft Intermediate Language) platform, family Mintluks
PWS:MSIL/Mintluks.A is a concrete detection of a password stealer specifically targeting Windows systems via .NET (MSIL) applications. It is designed to covertly collect and exfiltrate sensitive user credentials, posing a critical threat to data security and privacy.
Relevant strings associated with this threat: - microsoft corporation (PEHSTR_EXT) - C:\Users\sa\Downloads\Untitled\Untitled\VB.NET (PEHSTR_EXT) - Internet_Explorer.pdb (PEHSTR_EXT)
rule PWS_MSIL_Mintluks_A_2147707664_0
{
meta:
author = "threatcheck.sh"
detection_name = "PWS:MSIL/Mintluks.A"
threat_id = "2147707664"
type = "PWS"
platform = "MSIL: .NET intermediate language scripts"
family = "Mintluks"
severity = "Critical"
signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
threshold = "8"
strings_accuracy = "Low"
strings:
$x_1_1 = "microsoft corporation" ascii //weight: 1
$x_2_2 = "C:\\Users\\sa\\Downloads\\Untitled\\Untitled\\VB.NET" ascii //weight: 2
$x_1_3 = "Internet_Explorer.pdb" ascii //weight: 1
$x_5_4 = {02 91 20 3f ff ff ff 5f 1f 18 62 0a 06 7e ?? ?? ?? ?? 02 17 58 91 1f 10 62 60 0a} //weight: 5, accuracy: Low
condition:
(filesize < 20MB) and
(
((1 of ($x_5_*) and 1 of ($x_2_*) and 1 of ($x_1_*))) or
(all of ($x*))
)
}ea32ac24bd8dbac770beec79fa78d790a6156ceb5ff28d2bdba9b1f28a8b4628172acccc72c8f76ceb8cd40715399a6f5d318be3002c163e58e9843e891bbe7aImmediately isolate the compromised system and perform a deep antimalware scan. All potentially exposed credentials must be reset, especially for critical online services and system accounts. Investigate the infection source, likely a downloaded file, and implement measures to prevent similar future incidents.