Concrete signature match: Trojan - Appears legitimate but performs malicious actions for Linux platform, family Lightaidra
Trojan:Linux/Lightaidra is a sophisticated cross-platform threat identified by a concrete signature. Despite its Linux association, the detected artifact contains capabilities for process injection (hooking), persistence via Windows utilities (scheduled tasks, BITS), and executing malicious code through legitimate tools like PowerShell, mshta, regsvr32, and rundll32, indicating a versatile and dangerous payload.
Relevant strings associated with this threat: - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
2df8a7ceba4b1648f689d6fcee1ee41d0ca9d7bdc611a65c6c3d80c17ca89cf0432420c135f443d59d76544b0d73e8eb530d9eae7648f7e838015fc706b1eb85Immediately isolate the infected system. Perform a full system scan with updated antivirus and remove all detected components. Thoroughly investigate for persistence mechanisms (e.g., scheduled tasks, BITS jobs, registry modifications) and eliminate them. Due to potential deep compromise, consider re-imaging the system and reset all affected user and service account credentials.