user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat PWS:Win32/PrimaryPass!pz
PWS:Win32/PrimaryPass!pz - Windows Defender threat signature analysis

PWS:Win32/PrimaryPass!pz - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: PWS:Win32/PrimaryPass!pz
Classification:
Type:PWS
Platform:Win32
Family:PrimaryPass
Detection Type:Concrete
Known malware family with identified signatures
Suffix:!pz
Packed or compressed to evade detection
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Password Stealer - Steals credentials and sensitive information for 32-bit Windows platform, family PrimaryPass

Summary:

This threat is a password-stealing trojan from the PrimaryPass family, which actively steals user credentials. It uses advanced techniques like API hooking to capture sensitive data and leverages legitimate Windows tools such as PowerShell, BITS, and Scheduled Tasks to maintain persistence and exfiltrate the stolen information.

Severity:
Critical
VDM Static Detection:
Relevant strings associated with this threat:
 - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT)
 - rundll32 (PEHSTR_EXT)
 - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT)
 - !#HSTR:ExecutionGuardrails (PEHSTR_EXT)
 - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
Known malware which is associated with this threat:
Filename: 97673584C7A9D83366BAFF1628287ABC.exe
3a3b86845990070fa63fed00a32530b49765b5474e70e29b29889715eda8e23c
02/12/2025
Filename: 19cb5bdef2eff47500c1bd70526cc4c9.exe
3e295cdf4bd41a5988a8d9bc1c92ee66940a7f90d05046a4a52e2ca174523aee
18/11/2025
Remediation Steps:
Immediately isolate the affected machine from the network. Use Windows Defender to perform a full system scan and remove the threat. Assume all credentials on the system have been compromised; change all passwords and enable multi-factor authentication (MFA) for all critical accounts.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 17/11/2025. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$