Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Convagent
This is a concrete detection of Trojan:Win32/Convagent.RR!MTB, a sophisticated trojan confirmed by machine learning behavioral analysis. It leverages various Windows utilities like mshta, regsvr32, rundll32, PowerShell, and BITS for execution, persistence, C2, and exfiltration, exhibiting capabilities such as API hooking, data encoding, remote file operations, and anti-forensic file deletion.
Relevant strings associated with this threat: - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - GetCurrentDirectory (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT)
rule Trojan_Win32_Convagent_RR_2147895840_0
{
meta:
author = "threatcheck.sh"
detection_name = "Trojan:Win32/Convagent.RR!MTB"
threat_id = "2147895840"
type = "Trojan"
platform = "Win32: Windows 32-bit platform"
family = "Convagent"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
threshold = "2"
strings_accuracy = "Low"
strings:
$x_1_1 = {50 8d 85 00 fc ff ff 50 6a 00 6a 00 6a 04 6a 00 6a 00 6a 00 6a 00 8b 85 f8 fe ff ff 50 e8} //weight: 1, accuracy: High
$x_1_2 = {50 8b 85 48 fc ff ff 50 e8 ?? ?? ?? ?? 83 f8 01 1b c0 40 88 85 f3 fe ff ff 8b 85 48 fc ff ff 50 e8} //weight: 1, accuracy: Low
condition:
(filesize < 20MB) and
(all of ($x*))
}6a058069adac2a1688ab000c50dbc757eaf89ae8beff17387f00025ebfdb16d3Immediately isolate the infected system from the network. Remove the detected malicious files and perform a full, deep scan with updated antivirus software. Investigate for persistence mechanisms (e.g., scheduled tasks, registry modifications) and signs of compromise such as C2 communication, data exfiltration, or lateral movement. Apply all pending security patches and reinforce endpoint security configurations.