Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Phonzy
Trojan:Win32/Phonzy.A!ml is a concretely identified malicious program that establishes persistence using the Task Scheduler and may abuse system processes like svchost.exe. It appears to utilize command-line connection utilities like Plink for remote access, potentially communicating with domains such as www.gesucht.net for command and control or data exfiltration. The presence of 'DecrypterData' suggests it may decrypt its own components or other sensitive information.
Relevant strings associated with this threat: - xVTQqLsw0kmxHrGjIFBqwIoxKZAqYa5pRLwVx5opsAF2t7uQoYBPa3cJOiEDds6s (PEHSTR_EXT) - ATHh6g2suxIKjqSa6qb8Z7FoG9Wlwf9ABr (PEHSTR_EXT) - ki38BePBzpTHd3LXTjFVzdvBOQXaMHlWYn4wmFUSnMKxj9SGkLDIYw7feaaihtuSGrRgKmc45n (PEHSTR_EXT) - DecrypterData (PEHSTR_EXT) - TaskScheduler (PEHSTR_EXT) - Windows\Media\Log (PEHSTR_EXT) - svchost.exe (PEHSTR_EXT) - Plink: command-line connection utility (PEHSTR_EXT) - nologin@www.gesucht.net (PEHSTR_EXT)
8e3afb5fab98dcdc03a589e03df75085ef5987df8c6c1e66e73f0d494df036cebce49c897adce6a7dd8e4664b43456b46fe302dc4a27d7506ffaa58a966134fc6e9ccfe6dd2cdec470365a1723dc467d00c2aff0f333568b1004375bdda49b81b6d620bf5a4c887600d0f5945d6b398b47bb6b6031cc95a5a4fdfdd023583949299960fef14881150186bcefc291b8d49202305b0c90abb2e55fe8cad0ff3243Immediately isolate the infected system from the network. Perform a full system scan with up-to-date antivirus software to quarantine and remove all detected malicious files. Review and remove any suspicious entries in Task Scheduler, and monitor network logs for connections to known malicious domains. Consider changing any credentials that may have been compromised.