Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Malgent
This threat is a Trojan downloader, typically delivered via a malicious macro in an Office document. The macro downloads a second-stage payload from a remote server (45.78.21.150) and saves it to the user's desktop as 'quotation.exe' for execution, establishing a foothold on the system.
Relevant strings associated with this threat:
- = Environ("USERPROFILE") & "\Desktop" & "\quotation.exe" (MACROHSTR_EXT)
- http://45.78.21.150/boost/boosting.exe (MACROHSTR_EXT)
No specific strings found for this threatd024dbffa51bbb2f85ab478587a9971c3fdc88fae07f09abe37f1225be4fe0bd65493c28b5991bb8e73d1ceb94b3633137542c422ffc5dfd90801909dd475d58Isolate the affected host from the network immediately. Identify and delete the initial infection vector (e.g., a malicious Office document). Block the malicious IP (45.78.21.150) at the network perimeter. Investigate the host for further compromise, as the downloaded payload may have been executed.