Concrete signature match: Trojan - Appears legitimate but performs malicious actions for 64-bit Windows platform, family TurtleLoader
Trojan:Win64/TurtleLoader!rfn is a sophisticated Windows trojan that acts as a loader, executing malicious shellcode and potentially dropping secondary payloads. It utilizes advanced techniques like API hooking, data encoding, and leveraging legitimate Windows utilities (e.g., rundll32, PowerShell, scheduled tasks) for execution and persistence.
Relevant strings associated with this threat: - &@[*] Calling the Callback Function ... (PEHSTR) - C:\Windows\data.bin (PEHSTR_EXT) - apool.exe (PEHSTR_EXT) - Canon.QuickMenu.Utility (PEHSTR) - DllLoader (PEHSTR_EXT) - -Exception occurred during shellcode execution (PEHSTR) - $Failed to load and execute shellcode (PEHSTR) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
a85d9594291961d037a8aa9d4ce5529a4bdd7be97d299b984696ba36961473feImmediately isolate the infected system from the network. Perform a full system scan with updated antivirus/EDR to ensure complete removal of Trojan:Win64/TurtleLoader!rfn and any associated payloads. Conduct a thorough forensic investigation to identify the initial infection vector, scope of compromise, and potential data exfiltration.