Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 64-bit Windows platform, family Oyster
Trojan:Win64/Oyster!MTB is a malicious downloader detected through behavioral analysis. It connects to Google Drive to download and execute secondary payloads, uses system utilities like rundll32.exe for execution, and may attempt to delete itself to evade detection.
Relevant strings associated with this threat: - postman\Desktop\NZT\ProjectD_cpprest\CleanUp\Release\CleanUp.pdb (PEHSTR_EXT) - EXE (PEHSTR_EXT) - rundll32.exe %s,Test (PEHSTR_EXT) - COM (PEHSTR_EXT) - Loader\CleanUp\Release\CleanUp.pdb (PEHSTR_EXT) - NZT\ProjectD_WinInet\CleanUp\Release\CleanUp.pdb (PEHSTR_EXT) - )drive.usercontent.google.com/download?id= (PEHSTR) - HttpSendRequestA (PEHSTR) - ShellExecute (PEHSTR) - KERNEL32.DLL (PEHSTR_EXT) - postman\Desktop\NZT\ProjectD_cpprest (PEHSTR_EXT) - rundll32.exe (PEHSTR) - DllRegisterServer (PEHSTR) - HttpSendRequestA (PEHSTR_EXT) - Del /f /q "%s (PEHSTR_EXT) - cmd.exe /C ping (PEHSTR_EXT) - Mutex already exists, another instance is running. (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
523f54f5b1996c9740919899e5df05292092c5ae9fd0ef633e191a4acfc609e86b1251fb7b4f9458922c94f0abd0584fd891860ec12fee5da428b7b6dc1136f04631309051a5943e92656a421a01f79132f47b0367462ee1b9c50f56ab38e04f1. Isolate the affected machine from the network immediately. 2. Perform a full system scan with updated antivirus software to remove all malicious components. 3. Since this is a downloader, investigate for additional payloads, review persistence mechanisms (e.g., startup items, scheduled tasks), and change critical account passwords.