user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Trojan:Win32/Astaroth!pz
Trojan:Win32/Astaroth!pz - Windows Defender threat signature analysis

Trojan:Win32/Astaroth!pz - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Trojan:Win32/Astaroth!pz
Classification:
Type:Trojan
Platform:Win32
Family:Astaroth
Detection Type:Concrete
Known malware family with identified signatures
Suffix:!pz
Packed or compressed to evade detection
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Astaroth

Summary:

Trojan:Win32/Astaroth!pz is a sophisticated information-stealing Trojan known for using various living-off-the-land binaries (LoLBAS) like mshta, regsvr32, rundll32, and PowerShell for execution and persistence. It employs advanced techniques such as API hooking to steal credentials, leverages BITS jobs and scheduled tasks for persistence, and can perform data encoding and remote file operations for exfiltration.

Severity:
Critical
VDM Static Detection:
Relevant strings associated with this threat:
 - xGERAL.AR (PEHSTR_EXT)
 - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT)
 - rundll32 (PEHSTR_EXT)
 - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT)
 - !#HSTR:ExecutionGuardrails (PEHSTR_EXT)
 - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
Known malware which is associated with this threat:
Filename: 0b142c056c31efe2bd8a33f713ade52d29a6026a9ec581e98b8bc8a683577c21.dll
0b142c056c31efe2bd8a33f713ade52d29a6026a9ec581e98b8bc8a683577c21
31/01/2026
Remediation Steps:
Immediately isolate the infected system. Perform a full system scan to remove the threat and any related components. Review system logs for signs of persistence (e.g., scheduled tasks, BITS jobs) and change all user and administrative credentials that may have been compromised.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 30/01/2026. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$