Concrete signature match: Trojan - Appears legitimate but performs malicious actions for VBScript platform, family GuLoader
This threat is a VBScript downloader from the GuLoader family. Its primary function is to download and execute a secondary, more malicious payload, such as an information stealer or remote access trojan. The detection was triggered by machine learning behavioral analysis observing the script's attempt to execute a payload like 'aquaduct.exe'.
Relevant strings associated with this threat: - infeasibilities aquaduct.exe (PEHSTR_EXT) No specific strings found for this threat
rule Trojan_Win32_GuLoader_RSY_2147934560_0
{
meta:
author = "threatcheck.sh"
detection_name = "Trojan:Win32/GuLoader.RSY!MTB"
threat_id = "2147934560"
type = "Trojan"
platform = "Win32: Windows 32-bit platform"
family = "GuLoader"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
threshold = "5"
strings_accuracy = "High"
strings:
$x_1_1 = "ethanim pig domsudskrift" ascii //weight: 1
$x_1_2 = "bombyciform fljlerne sesquiduple" ascii //weight: 1
$x_1_3 = "formaalsls frues melanie" ascii //weight: 1
$x_1_4 = "fladbarmet" ascii //weight: 1
$x_1_5 = "infeasibilities aquaduct.exe" ascii //weight: 1
condition:
(filesize < 20MB) and
(all of ($x*))
}187c46bb2c04db37c266164e10d76305966f881901a784bf7c74ef99dcbb3fd94c799d06e05ed575524fc6fc718bd8ff1814d66bdc96cddf93bd77a7d47131f6cdc3073ab709cf2284bde59c6927a44712b6c6b59a81fc79d45a51753a90e95df36fa0d933bc573a7d37d5dfcf503fd6d47ee5294dbb2fcfc4f8c6bf4d67e152Isolate the affected machine from the network. Ensure Windows Defender has removed the VBS file and run a full system scan to detect any secondary payloads. Investigate for persistence mechanisms (e.g., scheduled tasks, registry run keys) and reset passwords for accounts used on the machine.