Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 32-bit Windows platform, family Zusy
This is a concrete detection of Trojan:Win32/Zusy.MK!MTB, a sophisticated variant of the Zusy banking Trojan. It leverages machine learning behavioral analysis to identify its use of advanced techniques like API hooking, abuse of legitimate Windows binaries (mshta, rundll32, regsvr32), PowerShell, BITS, and scheduled tasks for persistence, evasion, data exfiltration, and system compromise.
Relevant strings associated with this threat: - .rsrc (PEHSTR_EXT) - .idata (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
rule Trojan_Win32_Zusy_MK_2147951922_0
{
meta:
author = "threatcheck.sh"
detection_name = "Trojan:Win32/Zusy.MK!MTB"
threat_id = "2147951922"
type = "Trojan"
platform = "Win32: Windows 32-bit platform"
family = "Zusy"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
threshold = "30"
strings_accuracy = "Low"
strings:
$x_10_1 = {40 00 00 e0 2e 72 73 72 63 00 00 00 ?? ?? ?? 00 00 40 0d 00 00} //weight: 10, accuracy: Low
$x_10_2 = {40 00 00 c0 2e 69 64 61 74 61 20 20 00 10 00 00 00 ?? ?? 00 00 02 00 00} //weight: 10, accuracy: Low
$x_10_3 = {20 20 20 00 20 20 20 20 00 30 0d 00 00 10 00 00 00 38 06} //weight: 10, accuracy: High
condition:
(filesize < 20MB) and
(all of ($x*))
}8e0a99f71e8c0d509436a4719259cd2bdf2e6253e251ff36c1fca500cb1ee292Immediately isolate the affected system and initiate a full system scan with updated security software. Investigate for persistence mechanisms (e.g., scheduled tasks, BITS jobs), potential data exfiltration, and lateral movement. Reset all credentials used on the compromised system and restore from a known clean backup if available.