Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family PureLogs
Trojan:Win32/PureLogs!rfn is a highly evasive trojan that leverages numerous legitimate Windows utilities like mshta, regsvr32, rundll32, PowerShell, and BITS for execution and persistence. It employs API hooking, TripleDES encryption, and scheduled tasks to maintain stealth, control system behavior, and facilitate potential data exfiltration or remote command execution.
Relevant strings associated with this threat: - \AppData\Local\Temporary Projects\WindowsFormsApp1\obj\Debug\iTalk.pdb (PEHSTR_EXT) - TripleDESCryptoServiceProvider (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
4c35f0f5a81eb78ee167c2def3864d84d6f2fbf368eeab916f8be19e0ad049ccImmediately isolate the affected system to prevent further compromise. Perform a full system scan using an up-to-date EDR solution, removing all detected malicious files, associated registry entries, and persistence mechanisms like scheduled tasks or BITS jobs. Investigate for signs of lateral movement, credential theft, and data exfiltration, and reset any compromised credentials.