Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Matanbuchus
This is a concrete detection of Trojan:Win32/Matanbuchus!MTB, a sophisticated trojan. It leverages various Windows utilities (LOLBINs) like rundll32, regsvr32, PowerShell, and BITS, performs process injection/hooking, mimics system files, and establishes communication with a command-and-control server (bankruptcy-divorce.com) for potential further payload delivery or data exfiltration.
Relevant strings associated with this threat:
- 6001.icl (PEHSTR_EXT)
- DllInstall (PEHSTR_EXT)
- DllRegisterServer (PEHSTR_EXT)
- a0KuQkA2.dll (PEHSTR_EXT)
- EBoeQRIw.dll (PEHSTR_EXT)
- B:\LoadDll6\LoadDll\result\Release\libcurl.pdb (PEHSTR_EXT)
- DllInitialize (PEHSTR_EXT)
- RegisterDll (PEHSTR_EXT)
- C:\\kernel32 (PEHSTR_EXT)
- .InstallProduct (MACROHSTR_EXT)
- = CreateObject("WindowsInstaller.Installer") (MACROHSTR_EXT)
- bankruptcy-divorce.com/Bankruptcy/db.pak (MACROHSTR_EXT)
- !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT)
- rundll32 (PEHSTR_EXT)
- !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT)
- !#HSTR:ExecutionGuardrails (PEHSTR_EXT)
- !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)3ac90c071d143c3240974618d395fa3c5228904c8bf0a89a49f8c01cd7777421Immediately isolate the infected system. Perform a full system scan with updated antivirus/EDR. Block all network communication to 'bankruptcy-divorce.com'. Investigate for persistence mechanisms, credential theft, and data exfiltration. Rebuild the system if compromise is confirmed.