Concrete signature match: Trojan - Appears legitimate but performs malicious actions for .NET (Microsoft Intermediate Language) platform, family CelestialCStealer
This is a concrete detection of Trojan:MSIL/CelestialCStealer.DSK!MTB, an information-stealing Trojan identified by machine learning behavioral analysis. It leverages sophisticated techniques including process hooking, abuse of living-off-the-land binaries (like mshta, rundll32, regsvr32), PowerShell, BITS jobs, and scheduled tasks for execution, persistence, and evasion. The threat is capable of data encoding, remote file operations, and potentially network manipulation, all aimed at exfiltrating sensitive information.
Relevant strings associated with this threat: - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
d6794a5fe565bdb5451694d27c34b535409274e508b1400b7a7ccd823970d3d64eb10256903d23fe98c1b28886409ce9fb76a86fa31cdc11f87f42790c9156941866a1b6c1c64997769312d513eeee808f633fad3b31f45da6d4c957fa8dd052Immediately isolate the affected system from the network. Perform a full system scan with updated antivirus software to remove all detected components. Force password resets for all accounts (e.g., email, banking, corporate network) accessed from the compromised machine. Investigate the initial compromise vector and ensure all operating systems and applications are fully patched and up-to-date.