Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 64-bit Windows platform, family Kryptik
This is a concrete detection of Trojan:Win64/Kryptik!MTB, a sophisticated obfuscated Trojan. It attempts to disguise itself as legitimate software, impersonates system processes, abuses legitimate Windows tools (like MSHTA), and exhibits behaviors indicative of system compromise, data exfiltration, and persistence establishment.
Relevant strings associated with this threat: - NvidiaCatalysts.pdb (PEHSTR_EXT) - C:\Users\Sako\source\repos\NvidiaCatalysts\NvidiaCatalysts\obj\Debug (PEHSTR_EXT) - c:\temp\Assembly.exe (PEHSTR_EXT) - NJSDKLDHSD (PEHSTR_EXT) - gra1.FormGame.resources (PEHSTR_EXT) - IDbCommand (PEHSTR_EXT) - OleDbCommand (PEHSTR_EXT) - CompareString (PEHSTR_EXT) - ExecuteNonQuery (PEHSTR_EXT) - System.Security (PEHSTR_EXT) - \windows\system32\host.exe (PEHSTR_EXT) - /c del /q %s (PEHSTR_EXT) - InitComposer (PEHSTR_EXT) - AwakeComposer (PEHSTR_EXT) - InvokeComposer (PEHSTR_EXT) - System.Security.Cryptography.CAPI+CRYPT_ALGORITHM_IDENTIFIER2 (PEHSTR_EXT) - elf exe (PEHSTR_EXT) - livingfrom.dstars (PEHSTR_EXT) - Formwere3they.re.Q (PEHSTR_EXT) - SGivemovingDFor.overhathspirit (PEHSTR_EXT) - tidtcfvy.dll (PEHSTR_EXT) - get_ExecutablePath (PEHSTR_EXT) - requestedExecutionLevel (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
53cd5d327b487dab4cfb4a00c15c4802fb8edd96e9918813be99653fec3ac884Isolate the affected system immediately. Perform a full antivirus scan with updated definitions. Investigate system logs for persistence mechanisms or further compromise, and consider re-imaging the system if complete removal cannot be fully verified.