Concrete signature match: Trojan - Appears legitimate but performs malicious actions for VBScript platform, family Remcos
This is a VBScript-based Remcos Remote Access Trojan (RAT) detected with concrete machine learning behavioral analysis. It utilizes various system utilities like PowerShell, MSHTA, Regsvr32, Rundll32, BITSJobs, and Scheduled Tasks for execution, persistence, and evasion, enabling full remote control and potential data exfiltration from the compromised system.
Relevant strings associated with this threat:
- "powe" + "rs" + Range("F100").Value (MACROHSTR_EXT)
- ggg.ExecMethod_(HByn(), f8df00) (MACROHSTR_EXT)
- "C" + ActiveSheet.PageSetup.LeftFooter + fjjdf() (MACROHSTR_EXT)
- CreateObject(ActiveSheet.PageSetup.CenterHeader) (MACROHSTR_EXT)
- ZIARb().Exec kogH3 (MACROHSTR_EXT)
- For Each ZvFDlwx In ActiveWorkbook.BuiltinDocumentProperties (MACROHSTR_EXT)
- = "p" + ActiveSheet.PageSetup.CenterFooter (MACROHSTR_EXT)
- !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT)
- rundll32 (PEHSTR_EXT)
- !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT)
- !#HSTR:ExecutionGuardrails (PEHSTR_EXT)
- !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)c07d06adc9c7e3e5516508f737e02ec20dcb167b341705127d695d394b983cfe81c1e32e4cb09a7087440606a06625649d268e6159be794a5a2d6323265430ff7b998e3e817d913700336ceb36e178f39182ca60038f55624383857ab921bc4c38d7a93db30a6d59ca0be89e28b58714e5ee741265e123dc86a80f5e10277beeImmediately isolate the affected system, perform a full system scan with updated endpoint security software, and thoroughly investigate and remove all detected persistence mechanisms (e.g., scheduled tasks, registry modifications, startup entries). Monitor network activity for C2 communication and consider reimaging the system if complete eradication cannot be confirmed.