Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Rugmi
Trojan:Win32/Rugmi!rfn is a sophisticated Trojan leveraging multiple Windows utilities and techniques for stealthy execution and persistence. It abuses legitimate tools like mshta, regsvr32, rundll32, BITS, and PowerShell, combined with API hooking and scheduled tasks, to maintain control and potentially facilitate remote access or data exfiltration.
Relevant strings associated with this threat: - P:\fi\GPU\SSD\4o\switch\Synchronization\Buffer\oe\x86\debug\server\firm.pdb (PEHSTR_EXT) - U:\rout\x64\release\5bC\a2j\llq.pdb (PEHSTR_EXT) - \NewToolsProject\SQLite3Encrypt\Release\SQLite3Encrypt.pdb (PEHSTR_EXT) - rs-shell-main\kundalini (PEHSTR_EXT) - loader.pdb (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
dece1423c08ab0f3ce07e0358b424f41891977842bba20807564c00e8a783c75Immediately isolate the infected system to prevent further compromise. Perform a full system scan with up-to-date security software and remove all detected malicious files. Investigate for established persistence mechanisms, unauthorized network connections, and any potential data exfiltration or credential compromise.