Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Egairtigado
This threat is a Trojan that utilizes multiple native Windows tools (LOLBins) like rundll32, mshta, and PowerShell for execution and persistence. It employs advanced techniques such as API hooking, data encoding, and creating scheduled tasks to evade detection, download additional payloads, or exfiltrate data.
Relevant strings associated with this threat: - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT) No specific strings found for this threat
29329bf04d6724173564b6e20b7f12b8a6b4382d8f99911e68808a55fc3c2ecb2e16f69641a223aaacdf4f55696a4c6cae94a1529d2b801a4b50e6044e7d67940419804060bfcc8ef10c09ff0d2d016d16722f599201c81d27898eecc3d7a1b116a51f5f8dab32ddd23139c9a358635cf50b6b50bbff950552e9d583052071c70cc191ce9f62a36b15bae927276ae012d36065c64749c670cd1e376863d7b40e7206a389fc5a753ac3c235d1b8a92f7196cabae409c02384f9866df62e9d2ceaf5643e9071f3b0dd192bd068dfedbd16a5c15725698365a72ffd6ece9eb1cb5cIsolate the affected device from the network immediately. Use an updated antivirus solution to run a full system scan and remove all detected components. Investigate and clean up persistence mechanisms (e.g., scheduled tasks, BITS jobs), and reset all credentials that were used on the system.