Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 64-bit Windows platform, family Stealc
This threat is a trojan from the Stealc info-stealer family, designed to steal sensitive data from an infected system. It targets information such as browser credentials, cookies, cryptocurrency wallets, and other personal files. The '!MTB' suffix indicates this specific detection was made by Microsoft's machine learning-based behavioral analysis, which identified the file's malicious actions.
No specific strings found for this threat
rule Trojan_Win64_Stealc_GA_2147939347_0
{
meta:
author = "threatcheck.sh"
detection_name = "Trojan:Win64/Stealc.GA!MTB"
threat_id = "2147939347"
type = "Trojan"
platform = "Win64: Windows 64-bit platform"
family = "Stealc"
severity = "Critical"
info = "MTB: Microsoft Threat Behavior"
signature_type = "SIGNATURE_TYPE_PEHSTR_EXT"
threshold = "10"
strings_accuracy = "High"
strings:
$x_10_1 = {0f b7 c8 81 e9 19 04 00 00 74 14 83 e9 09 74 0f 83 e9 01 74 0a 83 e9 1c 74 05 83 f9 04 75 08} //weight: 10, accuracy: High
condition:
(filesize < 20MB) and
(all of ($x*))
}f4584140becea8907edb22c8a99d5e9e9157931aa1e2ab29522adbc9ba684f07b38e57dc8a718b9b9ecb84b8ad7c8fc11c5028e7b9f0eafc1591d5b58c9de9c273420694fb8c75bed7825d4074c596e681f36aa287efaddd60d7370e98abd7403ec41ebc9acb444fee5a1a94dfe97b783972513a0de1899f387b79b7043812e65f14beaba244bd8335e26210102783ffc5d7d49cae2a870342e9e911c26d0da81. Immediately disconnect the affected machine from the network to prevent data exfiltration. 2. Run a full system scan with an updated antivirus tool to remove the threat. 3. Change all critical passwords (email, banking, social media), enable multi-factor authentication (MFA), and monitor accounts for suspicious activity as credentials may have been compromised.