Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Casdet
Trojan:Win32/Casdet!rfn is a highly capable Windows 32-bit Trojan leveraging various system utilities like mshta, regsvr32, rundll32, BITS, and PowerShell for execution, persistence, and evasion. It exhibits advanced functionalities including API hooking for monitoring or manipulation, scheduled task creation, remote file operations, and data encoding, indicating a comprehensive and stealthy threat.
Relevant strings associated with this threat: - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
78ad7b62ff7e1e1411f1cb7e5fa343be3fe89a75a29e9b2848ba916df53ec5c6a2f8c96429914ff66662b432f9213a795856751290b5a510605212d5e6ee76380180f4f29c550aa1ffaa21af51711b29de99fb1d7c932d008a0e9356ae8a7d6089c1d1b61d7f863f8a651726e29f2ae3de7958f36b49a756069021817947d06cImmediately isolate the infected system to prevent further compromise. Perform a full system scan with updated antivirus definitions, remove all detected malicious files, and meticulously check for and remove any persistence mechanisms such as scheduled tasks, startup entries, or modified system configurations. Ensure all operating system and application security patches are up to date and monitor network traffic for suspicious activity.