Concrete signature match: Trojan - Appears legitimate but performs malicious actions for JavaScript platform, family Redirector
Trojan:JS/Redirector.ZIJ!MTB is a sophisticated JavaScript-based trojan identified through machine learning behavioral analysis. Beyond its redirector function, it leverages advanced techniques like process hooking, abusing legitimate Windows utilities (mshta, rundll32, PowerShell, BITS), and creating scheduled tasks to establish persistence, evade detection, and execute arbitrary code, posing a significant risk for further system compromise.
Relevant strings associated with this threat: - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
8220f8f18c4321c3759b301f42676664c1b693eb567a1d69bdae7d5cadb5efc3c53d5cb53a38c7200e6df7dafd1d9b47d49f039789c6c353148c27c5146704b1471f1a9f9d4fa4640c0ae354286353ff8b834cf06f651e49f9a7813c079655a40f627a2551efd46b218c2e9097c8be13e51db2be83065be7bba65d6a420b2060bce4d055d5aefc9635532df9112c3b710c6e3e5ff21662538154f1c468daca87Immediately isolate the infected system. Perform a comprehensive scan with an up-to-date EDR/antivirus solution, remove all detected artifacts, and thoroughly investigate for established persistence mechanisms (e.g., scheduled tasks, registry modifications) and any signs of secondary infections.