user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat Trojan:Win32/Znyonm!rfn
Trojan:Win32/Znyonm!rfn - Windows Defender threat signature analysis

Trojan:Win32/Znyonm!rfn - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: Trojan:Win32/Znyonm!rfn
Classification:
Type:Trojan
Platform:Win32
Family:Znyonm
Detection Type:Concrete
Known malware family with identified signatures
Suffix:!rfn
Specific ransomware family name
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Znyonm

VDM Static Detection:
Relevant strings associated with this threat:
 - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT)
 - rundll32 (PEHSTR_EXT)
 - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT)
 - !#HSTR:ExecutionGuardrails (PEHSTR_EXT)
 - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT)
 - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
Known malware which is associated with this threat:
Filename: INCI ENDUSTRIE SIPARIS 2026_STOK VE FIYAT BILGISI.exe
61f56e3fbf2c77baf532aba5d4457ac47e445f1e87eafb520c0474511a3fb1b3
17/01/2026
Filename: INVOICE 302 303_PDF.js
6c76e515ef8525fbf5081da6da361951866ccc08f9b4e7bf32693f35b5614660
23/12/2025
Filename: ConfigChase.exe
e071989778ac25e69209addcac3c95aa734ed23585649a268a75a63f4bb58182
19/12/2025
Filename: 49b7629b41572ef6c7f0f8666d45ded1e2d18609782c3592443786073559fd4f
49b7629b41572ef6c7f0f8666d45ded1e2d18609782c3592443786073559fd4f
08/12/2025
Filename: PBC_YD10_INV8035360426.zip
e483a5db130d36b8394c492a78f8a275858118d6f776bd669d7dcc5ea17c8035
15/11/2025
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 10/11/2025. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$