Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Egairtigado
Trojan:Win32/Egairtigado!rfn is a concrete detection of the sophisticated TigerRAT backdoor, attributed to the Andariel APT group. This malware uses extensive hooking, legitimate Windows utilities (mshta, regsvr32, rundll32, PowerShell, BITS) for execution and persistence, enabling remote control, data exfiltration, and evasion.
Relevant strings associated with this threat: - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
48548d9678e0433d52837ba124819ae8e7ee54641a96936b32b46deb312f2463c8e41815770b17624a724a6f16be26a55f8d7fdb12dba529efb4b388ac19f8e34d0ac144f8c297610edb552710c198eef0bac2ac1cacd8210a437941dae3987d8428d2db1f70caaa79934f30068fb4eddd4874ca5702ad53c5c8c12c46513f24ea26d6a614701b039394bf7cf50b7cf63ad98fb90c0328e5ffd87ccdb9816be8346e75418d57e1848064614e3922813955ca10e7d015ba3679f9036ac31fa1bd5ae30eecdfb95d98cf238ff69b392cb36d1d3fb09481d79fa92c69dad48a0df0Immediately isolate the affected system. Perform a full system scan with updated antivirus, then conduct a thorough forensic investigation to identify the initial compromise vector, scope, and any lateral movement. Reset all potentially compromised credentials and enhance network monitoring for related indicators of compromise.