Concrete signature match: Trojan - Appears legitimate but performs malicious actions for .NET (Microsoft Intermediate Language) platform, family ClipBanker
Trojan:MSIL/ClipBanker.GC!MTB is a concrete detection for a .NET-based clipbanker trojan that actively monitors the clipboard for cryptocurrency wallet addresses and swaps them with the attacker's. It includes anti-analysis capabilities, persistence mechanisms via scheduled tasks, and may also target online trade platforms like Steam.
Relevant strings associated with this threat: - choice /C Y /N /D Y /T (PEHSTR_EXT) - steamcommunity.com/tradeoffer (PEHSTR_EXT) - SbieDll.dll (PEHSTR_EXT)
rule Trojan_MSIL_ClipBanker_GC_2147774355_0
{
meta:
author = "threatcheck.sh"
detection_name = "Trojan:MSIL/ClipBanker.GC!MTB"
threat_id = "2147774355"
type = "Trojan"
platform = "MSIL: .NET intermediate language scripts"
family = "ClipBanker"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
threshold = "16"
strings_accuracy = "High"
strings:
$x_10_1 = "Clipper" ascii //weight: 10
$x_1_2 = "Clipboard" ascii //weight: 1
$x_1_3 = "Regex" ascii //weight: 1
$x_1_4 = "choice /C Y /N /D Y /T" ascii //weight: 1
$x_1_5 = "schtasks" ascii //weight: 1
$x_1_6 = "0x[a-fA-F0-9]{40}" ascii //weight: 1
$x_1_7 = "APPDATA" ascii //weight: 1
$x_1_8 = "processhacker" ascii //weight: 1
$x_1_9 = "procexp" ascii //weight: 1
$x_1_10 = "taskmgr" ascii //weight: 1
condition:
(filesize < 20MB) and
(
((1 of ($x_10_*) and 6 of ($x_1_*))) or
(all of ($x*))
)
}c733a9293f2f3dbe2a6681c3dd8c814a2bb22a7561e98d8194f69b82fefe71349b018f68690323664a620a8e68fde297268218cf648d3575562d4e0cb689b6fdImmediately isolate the infected system to prevent further compromise. Perform a full system scan with an updated antivirus solution and manually remove all detected threats. Review and remove any suspicious scheduled tasks or startup entries created by the malware. Users should change passwords for all online accounts, especially those related to cryptocurrency or online trading, that were accessed from the compromised machine.