Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Dorv
Trojan:Win32/Dorv.A is a highly critical Windows 32-bit Trojan identified by concrete code signatures and specific internal identifiers. This threat is designed to compromise system integrity and can enable unauthorized access or malicious activities on infected systems.
Relevant strings associated with this threat:
- _at= (SNID)
- ,rhArH (SNID)
- +'q'9H.R (SNID)
- O_\UT!{o (SNID)
- Azi (SNID)
- nahip (SNID)
- xasI (SNID)
- P)a0A (SNID)
- ai( (SNID)
- bA< (SNID)
- vJAv (SNID)
- la} (SNID)
- _Ax (SNID)
- fa+ (SNID)
- >w#.n (SNID)
- aDP (SNID)
- E!a# (SNID)
- dAf= (SNID)
- XU;A|mw' (SNID)
- !R\nv (SNID)
- |#d1e49aac-8f56-4280-b9ba-993a6d77406c (NID)
- }#d1e49aac-8f56-4280-b9ba-993a6d77406c (NID)
- &|#b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 (NID)
- &}#b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 (NID)
- y*|#56a863a9-875e-4185-98a7-b882c64b5ce5 (NID)
- y*}#56a863a9-875e-4185-98a7-b882c64b5ce5 (NID)
- C|#be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 (NID)
- C}#be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 (NID)
- L|#3b576869-a4ec-4529-8536-b80a7769e899 (NID)
- L}#3b576869-a4ec-4529-8536-b80a7769e899 (NID)
- |#5beb7efe-fd9a-4556-801d-275e5ffc04cc (NID)
- }#5beb7efe-fd9a-4556-801d-275e5ffc04cc (NID)
- |#01443614-cd74-433a-b99e-2ecdc07bfc25 (NID)
- }#01443614-cd74-433a-b99e-2ecdc07bfc25 (NID)
- |#d3e037e1-3eb8-44c8-a917-57927947596d (NID)
- }#d3e037e1-3eb8-44c8-a917-57927947596d (NID)
- |#7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c (NID)
- }#7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c (NID)
- |#92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b (NID)
- }#92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b (NID)rule Trojan_Win32_Dorv_A_2147797739_0
{
meta:
author = "threatcheck.sh"
detection_name = "Trojan:Win32/Dorv.A!MTB"
threat_id = "2147797739"
type = "Trojan"
platform = "Win32: Windows 32-bit platform"
family = "Dorv"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_PEHSTR"
threshold = "20"
strings_accuracy = "High"
strings:
$x_10_1 = {8d bd 35 f2 ff ff 88 9d 34 f2 ff ff f3 ab 66 ab aa 8b ce 33 c0 8d bd 2d f0 ff ff 88 9d 2c f0 ff ff f3 ab 66 ab aa 8b ce} //weight: 10, accuracy: High
$x_10_2 = {8a d8 8a fb 8b d1 8b c3 c1 e0 10 66 8b c3 5b c1 e9 02 f3 ab} //weight: 10, accuracy: High
condition:
(filesize < 20MB) and
(all of ($x*))
}fec621c1c067ad7201bd229124336d61e7cce999d7ea512f1e6f9d42e7ecec88Immediately isolate the affected system to prevent further spread. Perform a full system scan with updated Windows Defender definitions, followed by thorough removal or quarantine of the detected malicious files. Ensure all operating system and software patches are current to mitigate re-infection.