Concrete signature match: Trojan - Appears legitimate but performs malicious actions for VBScript platform, family XWorm
This detection indicates a VBS-based variant of XWorm, a potent Remote Access Trojan (RAT), identified through machine learning behavioral analysis. The malware leverages legitimate Windows utilities like mshta, rundll32, regsvr32, PowerShell, and BITS for execution, persistence, and command-and-control operations. Its capabilities include process hooking, data encoding, remote file manipulation, scheduled task creation, and network configuration changes, posing a significant threat to system integrity and data confidentiality.
Relevant strings associated with this threat: - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
07ce35b881876429b23fccdb2a75e09e1da5ccec71e4ba38301843d1039f3a1262fd03bdf9c53269615883519cc93c38013aac356e31913c13c90df7a7f14dd0Immediately isolate the affected system to prevent further compromise. Perform a full system scan with updated antivirus definitions to remove the malware and associated artifacts. Investigate for persistence mechanisms (e.g., scheduled tasks, registry entries) and network connections. Reset credentials for any accounts used on the compromised host, and consider re-imaging the system if complete eradication cannot be confirmed.