Concrete signature match: Trojan Downloader - Downloads additional malware for Linux platform, family SAgnt
This detection, identified as TrojanDownloader:Linux/SAgnt!AMTB, represents a sophisticated malicious downloader that, despite its Linux family designation, contains extensive Windows-specific functionalities. Its capabilities include utilizing `mshta`, `rundll32`, PowerShell, BITS jobs, and scheduled tasks for execution, persistence, and evasion on Windows systems. The primary goal is to download and execute further malicious payloads, posing a significant risk to the compromised system.
Relevant strings associated with this threat: - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
571ddf01e407ecddca1df9db3e5212f8ae76d8d3dfea292facdb862b984ddb67Immediately isolate the infected system to prevent further compromise and network spread. Conduct a comprehensive forensic investigation to identify and remove all associated malicious files, persistence mechanisms (e.g., scheduled tasks, registry modifications), and any downloaded payloads. Strengthen security controls, ensure all systems are patched, and update endpoint protection signatures.