Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family SuspGolang
Trojan:Win32/SuspGolang.AG is a backdoor trojan written in the Go programming language that establishes unauthorized remote access to an infected system. The threat is capable of creating SOCKS proxies and TCP forwarders to tunnel malicious traffic through the compromised host and can manipulate system services for persistence or defense evasion.
Relevant strings associated with this threat: - WGSocksStopReq). (PEHSTR_EXT) - WGTCPForwardersReq). (PEHSTR_EXT) - WGSocksServersReq). (PEHSTR_EXT) - WGTCPForwarder). (PEHSTR_EXT) - ServiceInfoReq). (PEHSTR_EXT) - StopServiceReq). (PEHSTR_EXT) - RemoveServiceReq). (PEHSTR_EXT) - BackdoorReq). (PEHSTR_EXT) - ).SetUniformBytes (PEHSTR_EXT) - ).SetCanonicalBytes (PEHSTR_EXT) - ).SetBytesWithClamping (PEHSTR_EXT)
rule Trojan_Win32_SuspGolang_AG_2147915794_0
{
meta:
author = "threatcheck.sh"
detection_name = "Trojan:Win32/SuspGolang.AG"
threat_id = "2147915794"
type = "Trojan"
platform = "Win32: Windows 32-bit platform"
family = "SuspGolang"
severity = "Critical"
signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
threshold = "11"
strings_accuracy = "High"
strings:
$x_1_1 = "WGSocksStopReq)." ascii //weight: 1
$x_1_2 = "WGTCPForwardersReq)." ascii //weight: 1
$x_1_3 = "WGSocksServersReq)." ascii //weight: 1
$x_1_4 = "WGTCPForwarder)." ascii //weight: 1
$x_1_5 = "ServiceInfoReq)." ascii //weight: 1
$x_1_6 = "StopServiceReq)." ascii //weight: 1
$x_1_7 = "RemoveServiceReq)." ascii //weight: 1
$x_1_8 = "BackdoorReq)." ascii //weight: 1
$x_1_9 = ").SetUniformBytes" ascii //weight: 1
$x_1_10 = ").SetCanonicalBytes" ascii //weight: 1
$x_1_11 = ").SetBytesWithClamping" ascii //weight: 1
condition:
(filesize < 20MB) and
(all of ($x*))
}00f799dc6756579035e233ae0212704407dc30cfba938152baea9e2cfc21edf7783117155dbdff7084c24de5a887cb322ea83a5d054fb033b30f735e12348c43a316f54c1e2d594757554fcdb4b66d6fdd399eaea0328491fccab16b701ef033f3064e852a2dd178aeb950c914f42689bf075ccaddf881938c4f7ff6b418d0f471db4999013e7987e10ca2374d9a101591ffbd31befd4f0bc2bffc47f57a83171. Isolate the affected machine from the network immediately to prevent lateral movement. 2. Use Windows Defender to perform a full system scan and remove the detected threat. 3. Due to the backdoor capability, investigate for persistence, reset all user credentials on the machine, and consider reimaging the system to ensure complete removal.