Concrete signature match: SupportScam for 32-bit Windows platform, family Screcwon
This threat is a technical support scam tool, identified as a .NET application, designed to deceive users by displaying fake security alerts or system errors. It communicates with a network of malicious domains to facilitate the scam, aiming to coerce the user into contacting fraudulent support agents who may demand payment or install further malware.
Relevant strings associated with this threat: - Release\ClickOnceRunner.pdb (PEHSTR_EXT) - Release\DotNetRunner.pdb (PEHSTR_EXT) - .filesdonwloads.com (PEHSTR_EXT) - relay.magaretcap.com (PEHSTR_EXT) - relay.shipperzone.online (PEHSTR_EXT) - fmt2as.ddns.net (PEHSTR_EXT) - app.ratoscreensell.com (PEHSTR_EXT) - relay.ale3rt.in (PEHSTR_EXT) - microsoffeedd4ackapiz.enterprisesolutions.su (PEHSTR_EXT) - .putinswin.es (PEHSTR_EXT) - dual.saltuta.com (PEHSTR_EXT) - brovanti.de (PEHSTR_EXT) - .ratoscbom.com (PEHSTR_EXT) - pulseriseglobal.com (PEHSTR_EXT) - .myedelta.de (PEHSTR_EXT) - kingcardano.io (PEHSTR_EXT) - .viewyourstatementonline.com (PEHSTR_EXT) - preyinthewild.online (PEHSTR_EXT) - download.e-statement.estate (PEHSTR_EXT) - hp.noleggiodisciza.com (PEHSTR_EXT)
rule SupportScam_Win32_Screcwon_MD_2147947634_0
{
meta:
author = "threatcheck.sh"
detection_name = "SupportScam:Win32/Screcwon.MD!MTB"
threat_id = "2147947634"
type = "SupportScam"
platform = "Win32: Windows 32-bit platform"
family = "Screcwon"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
threshold = "50"
strings_accuracy = "High"
strings:
$x_20_1 = "Release\\ClickOnceRunner.pdb" ascii //weight: 20
$x_20_2 = "Release\\DotNetRunner.pdb" ascii //weight: 20
$x_30_3 = ".filesdonwloads.com" ascii //weight: 30
$x_30_4 = "relay.magaretcap.com" ascii //weight: 30
$x_30_5 = "relay.shipperzone.online" ascii //weight: 30
$x_30_6 = "fmt2as.ddns.net" ascii //weight: 30
$x_30_7 = "app.ratoscreensell.com" ascii //weight: 30
$x_30_8 = "relay.ale3rt.in" ascii //weight: 30
$x_30_9 = "microsoffeedd4ackapiz.enterprisesolutions.su" ascii //weight: 30
$x_30_10 = ".putinswin.es" ascii //weight: 30
$x_30_11 = "dual.saltuta.com" ascii //weight: 30
$x_30_12 = "brovanti.de" ascii //weight: 30
$x_30_13 = ".ratoscbom.com" ascii //weight: 30
$x_30_14 = "pulseriseglobal.com" ascii //weight: 30
$x_30_15 = ".myedelta.de" ascii //weight: 30
$x_30_16 = "kingcardano.io" ascii //weight: 30
$x_30_17 = ".viewyourstatementonline.com" ascii //weight: 30
$x_30_18 = "preyinthewild.online" ascii //weight: 30
$x_30_19 = "download.e-statement.estate" ascii //weight: 30
$x_30_20 = "hp.noleggiodisciza.com" ascii //weight: 30
$x_30_21 = "dev.southsideblackancestry.com" ascii //weight: 30
$x_30_22 = "server.ygoogley.in" ascii //weight: 30
$x_30_23 = "camp.organzoperate.com" ascii //weight: 30
$x_30_24 = "mail.securedocumentfiledownload.com" ascii //weight: 30
$x_30_25 = "doc-sas.marqulsmitchel.com" ascii //weight: 30
$x_30_26 = "jntl.shop" ascii //weight: 30
$x_30_27 = "solandalucia-carcosmetics.com" ascii //weight: 30
$x_30_28 = "dynomar.gandizon.com" ascii //weight: 30
$x_30_29 = "bw36back93.site" ascii //weight: 30
$x_30_30 = "fw396back6.site" ascii //weight: 30
$x_30_31 = "relay.adobpdf.com" ascii //weight: 30
$x_30_32 = "sent.costariga.de" ascii //weight: 30
$x_30_33 = "pilwerui.rchelp.top" ascii //weight: 30
$x_30_34 = "rwbhelp.top" ascii //weight: 30
$x_30_35 = "zvhelp.top" ascii //weight: 30
$x_30_36 = "kcclive.top" ascii //weight: 30
$x_30_37 = "mango.quatrocliche.com" ascii //weight: 30
condition:
(filesize < 20MB) and
(
((1 of ($x_30_*) and 1 of ($x_20_*))) or
((2 of ($x_30_*))) or
(all of ($x*))
)
}8401a048f5f4523667b02e4e49a8b76d800051cac0f8044f9698ac4c70558861b1978688891fd36ed3e215a5b496b0500db7f238aff6176d87613c133249e5b793e4fbed69c23ab3e4262e39f0b2409fc692cbc57aa68c72af94fdfd3c71c482Isolate the affected machine from the network immediately. Run a full antivirus scan with updated definitions to locate and quarantine all malicious files. Block all domains listed in the technical analysis at the network firewall or proxy. Review and remove any suspicious persistence mechanisms, such as scheduled tasks, startup entries, or browser extensions.