Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 64-bit Windows platform, family BazarLoader
This detection identifies Trojan:Win64/BazarLoader.ABZR!MTB, a sophisticated initial access trojan known for deploying additional malware. It utilizes various techniques for execution (e.g., mshta, regsvr32, rundll32, PowerShell), persistence (e.g., scheduled tasks, BITS jobs), evasion (e.g., API hooking, data encoding), and potentially lateral movement or data exfiltration.
Relevant strings associated with this threat: - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
rule Trojan_Win64_BazarLoader_ABZR_2147943043_0
{
meta:
author = "threatcheck.sh"
detection_name = "Trojan:Win64/BazarLoader.ABZR!MTB"
threat_id = "2147943043"
type = "Trojan"
platform = "Win64: Windows 64-bit platform"
family = "BazarLoader"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
threshold = "1"
strings_accuracy = "High"
strings:
$x_1_1 = {8b 45 fc 83 c0 01 99 c1 ea 18 01 d0 0f b6 c0 29 d0 89 45 fc 8b 45 fc 48 63 d0 48 8b 45 20 48 01 d0 0f b6 00 0f b6 d0 8b 45 f8 01 d0 99 c1 ea 18 01 d0 0f b6 c0 29 d0 89 45 f8 8b 45 fc 48 63 d0} //weight: 1, accuracy: High
condition:
(filesize < 20MB) and
(all of ($x*))
}c4780e33d7ab1bcd6304daede805b5ae0270c4aa8cea8823467e22697dd2f39bImmediately isolate the infected system from the network. Initiate a full scan with updated antivirus software to remove all detected components. Conduct a thorough forensic analysis to determine the initial access vector, extent of compromise, and identify any additional malware payloads. Reset all potentially compromised credentials and monitor network traffic for suspicious activity. Consider rebuilding the affected system from a trusted image.