Concrete signature match: Trojan - Appears legitimate but performs malicious actions for Linux platform, family Ladvix
Trojan:Linux/Ladvix!rfn is a concrete detection for a Linux-based trojan exhibiting extensive capabilities for targeting Windows systems. It indicates a sophisticated threat leveraging Windows attack vectors such as process injection (hooking), execution via `rundll32`, `mshta`, and `regsvr32`, persistence through scheduled tasks and BITS jobs, network manipulation, and defense evasion techniques.
Relevant strings associated with this threat: - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
59b23875460d76b5fcab639fe60c7fc33132022c2b5201c4959f4eb0b9549954110a6a446b43ac28de0adf74e32723a34117634ce5d3c8bff0183a77f4e71cf079ac8233962ce67223a2ea43a4ff994b35edfa90208ed3006a9f98bb2f033810d38cccb2ea0e44b5903437093b44174441650a266ab0498a775bf619d2107efd5a51790c1b9bb6a3cb8540187c2fa76fccf31ed3031dd4b0dc918488027c7a41Immediately isolate the infected Linux system and conduct a comprehensive forensic analysis to determine the full scope of compromise and its interactions with Windows environments. Perform full scans on all connected Windows endpoints, implement extracted Indicators of Compromise (IOCs) across the network, reset any potentially compromised credentials, and ensure all systems are fully patched.