Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Floxif
This detection indicates a Trojan from the Win32/Floxif family, a sophisticated malware known for backdoor capabilities and information stealing. The threat specifically uses characteristics linked to the past CCleaner supply chain attack, aiming for system compromise, persistence via legitimate Windows utilities like rundll32, and communication with command-and-control servers for data exfiltration or further malicious instructions.
Relevant strings associated with this threat: - \kill\Driver\i386\KILLPRC.pdb (PEHSTR_EXT) - $1.1/ (PEHSTR_EXT) - \CCleaner\CCleaner.exe (ASEP_FILEPATH) - (x86)\CCleaner\CCleaner.exe (ASEP_FILEPATH) - \CCleaner Cloud\CCleanerCloudAgent.exe (ASEP_FILEPATH) - (x86)\CCleaner Cloud\CCleanerCloudAgent.exe (ASEP_FILEPATH) - \spool\prtprocs\w32x86\localspl.dll (PEHSTR_EXT) - /s/seemorebty/index2.php (PEHSTR_EXT) - MIGJAoGBAM84QY/eHMjGXDDAlYv (PEHSTR_EXT) - WeoiJu08hW7a5SQlPGFCPvBaTIeGCbEWdMBprxeqMiisxegf1sL3AgMBAAE= (PEHSTR_EXT) - Software\ffdroider (PEHSTR_EXT) - /profile.php?id= (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf50859ee9e8e2522fec43a24f7c3742d01acad4cf6d8444a23d130b329f03f7103e35Immediately isolate the infected host from the network. Perform a full, deep scan with updated antivirus/EDR software to ensure complete eradication of the Trojan and associated components. Investigate for persistence mechanisms, C2 communication, and potential data exfiltration; if data compromise is suspected, initiate credential resets. Ensure all software, particularly system utilities and CCleaner, is validated, up-to-date, and sourced from official channels.