Concrete signature match: Trojan - Appears legitimate but performs malicious actions for JavaScript platform, family GuLoader
Trojan:JS/GuLoader.PA!MTB is a sophisticated JavaScript-based malware loader, detected by concrete machine learning behavioral analysis, designed to evade detection and deliver secondary malicious payloads. It extensively abuses legitimate system tools like mshta, regsvr32, rundll32, PowerShell, and BITS, employs process hooking, persistence via scheduled tasks, and data encoding. This variant performs actions such as remote file copying and file deletion, indicating a comprehensive and stealthy attack chain.
Relevant strings associated with this threat: - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
35e985ce8f9bab835fee28778970384d9f893b2dce4a23e134a47841fbd73155ab8deae8424265485d0c8f5ab56ad1f62936cf9034b9ad9eaea5730fbf0d7a06dfd80c7deb4bca838389f8078ce3e3b6231139f45e6e919bccfb7cdfa60046f1Immediately isolate the infected system to prevent further compromise. Perform a full system scan with updated antivirus/EDR, thoroughly investigate for secondary infections or persistence mechanisms (e.g., scheduled tasks, registry modifications), and remove all identified malicious artifacts. Apply all available security patches, enhance endpoint security controls, and reinforce user awareness training to mitigate future risks.