Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 64-bit Windows platform, family Midie
This is a concrete detection of a Win64 Trojan (Midie family) that employs advanced techniques like API hooking and leveraging `mshta.exe` for execution. It likely drops various dynamically named DLLs and executables, potentially masquerading as other file types, to establish persistence and carry out its malicious objectives.
Relevant strings associated with this threat: - Control_RunDLL (PEHSTR_EXT) - DllInstall (PEHSTR_EXT) - \trapped.pdf (PEHSTR_EXT) - \hotdog.dll (PEHSTR_EXT) - \stepfather\bowels.pdf (PEHSTR_EXT) - \airwaves\lemonade.bmp (PEHSTR_EXT) - jsalfhxh.dll (PEHSTR_EXT) - dcnwnqsg.pdb (PEHSTR_EXT) - \compiling\flock\admonish.jpg (PEHSTR_EXT) - \provides.exe (PEHSTR_EXT) - yzlhbxxh.dll (PEHSTR_EXT) - \breakthrough.exe (PEHSTR_EXT) - \breakthrough\integral.dll (PEHSTR_EXT) - \disagreements.au (PEHSTR_EXT) - \integral\devils.exe (PEHSTR_EXT) - \churches\brock.au (PEHSTR_EXT) - \breakthrough.pdf (PEHSTR_EXT) - \classical.lnk (PEHSTR_EXT) - skxlszqn.dll (PEHSTR_EXT) - qnizkqmx.dll (PEHSTR_EXT) - eptowgmf.dll (PEHSTR_EXT) - vmsloanb.dll (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForSoftwarePacking.C!pli (PEHSTR_EXT)
8b251d3db2a5b963ba447b51ec2c67b2ffb3c908ea77d24fc2cea89cdbf35000Immediately isolate the affected system to prevent further spread. Perform a comprehensive system scan with an updated antivirus solution to remove all detected malicious files and components. Investigate for established persistence mechanisms and consider system re-imaging if full eradication cannot be confirmed.