Concrete signature match: Trojan - Appears legitimate but performs malicious actions for .NET (Microsoft Intermediate Language) platform, family barys
This is a sophisticated Trojan from the MSIL/barys family, detected concretely via machine learning behavioral analysis. It employs various techniques like process injection, API hooking, and system utility abuse (BITS, PowerShell, scheduled tasks) to establish persistence, manipulate network settings, and exfiltrate data. Originating from a known malicious GitHub repository and actively distributed via web downloads, it poses a significant and advanced threat.
Relevant strings associated with this threat: - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
9691ddc08712445cba00656b4d7965eee2c045ebbcabe81c0a1f21f5357a953b7144fa6258d7efb3a5f97443d77add4bc0a0afe9e67a3ba8c3f5a036cd6e6226Immediately isolate the infected system and initiate a full system scan with an updated EDR/antivirus solution. Block the identified SHA256 hash (9691ddc08712445cba00656b4d7965eee2c045ebbcabe81c0a1f21f5357a953b) and any identified command and control (C2) infrastructure on all network and endpoint security controls. Conduct a forensic investigation to identify the infection vector, remove all persistence mechanisms, and ensure no further compromise or data exfiltration occurred.