Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Vindor
Trojan:Win32/Vindor!pz is a sophisticated Win32 Trojan that employs various techniques for execution, persistence, and evasion. It abuses legitimate Windows utilities like mshta, regsvr32, rundll32, BITS, and PowerShell, utilizes API hooking, creates scheduled tasks, and encodes data to maintain stealth and control over the compromised system.
Relevant strings associated with this threat: - jWy\7 (SNID) - \l*s` (SNID) - U!(/4 (SNID) - .NpUn (SNID) - jE*.; (SNID) - 9.9[/ (SNID) - '.Q%IA (SNID) - CL;\wp (SNID) - [/CZ& (SNID) - [@`W/z (SNID) - HLzV\ (SNID) - "\~?3 (SNID) - .'_Hh, (SNID) - !qWDv/ (SNID) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
c12bd71bd138cd2688084566344479991130c253998938a10a665b33db5755a8Immediately isolate the infected system. Perform a full system scan with updated security software to remove all detected malicious files. Investigate and eliminate any persistence mechanisms, such as scheduled tasks or modified registry entries. Review system logs for signs of lateral movement or data exfiltration.