Concrete signature match: Trojan Downloader - Downloads additional malware for PowerShell platform, family ClipBanker
This threat is a PowerShell-based trojan from the ClipBanker family, detected through behavioral analysis. It monitors the system clipboard, using regular expressions to find and replace cryptocurrency wallet addresses, Steam trade offers, and donation links with attacker-controlled equivalents. The malware also creates persistence via Scheduled Tasks and Run keys to ensure it executes on startup.
Relevant strings associated with this threat:
- System.Text.RegularExpressions (PEHSTR_EXT)
- \Bitcoin-Grabber-master\Bitcoin-Grabber\ (PEHSTR_EXT)
- 2.pdb (PEHSTR_EXT)
- b4([0-9]|[A-B])(.){93} (PEHSTR_EXT)
- schtasks.exe (PEHSTR_EXT)
- steamcommunity.com/tradeoffer (PEHSTR_EXT)
- donationalerts.com/ (PEHSTR_EXT)
- marie\Desktop\clipmonitor KETHAS FINAL EVERYTHING FIXED\clipmonitor (PEHSTR_EXT)
- CLIPBOARD: '' vs. '' (PEHSTR_EXT)
- SOFTWARE\Borland\Delphi\RTL (PEHSTR_EXT)
- ShellExecuteExA (PEHSTR_EXT)
- C:\ProgramData\MyApp\ (PEHSTR_EXT)
- v4.0.30319 (PEHSTR_EXT)
- \b(bitcoincash) (PEHSTR_EXT)
- choice /C Y /N /D Y /T (PEHSTR_EXT)
- SbieDll.dll (PEHSTR_EXT)
- SOFTWARE\Microsoft\Windows\CurrentVersion\Run (PEHSTR_EXT)
- clrjit.dll (PEHSTR_EXT)
- http://bot.whatismyipaddress.com/ (PEHSTR_EXT)
- SOFTWARE\WOW6432Node\Clients\StartMenuInternet (PEHSTR_EXT)
- shell\open\command (PEHSTR_EXT)
- ^bc1[123456789ABCDEFGHJKLMNPQRSTUVWXYZabcdefghijkmnopqrstuvwxyz].*$ (PEHSTR_EXT)
- https://api.telegram.org/bot (PEHSTR_EXT)
- https://ipv4bot.whatismyipaddress.com/ (PEHSTR_EXT)
- WinHost.exe (PEHSTR_EXT)
- Sevirem.Clipper (PEHSTR_EXT)
- Decompress (PEHSTR_EXT)
- pyi-windows-manifest-filename crypto-yank.exe.manifest (PEHSTR_EXT)
- email._encoded_words (PEHSTR_EXT)
- http.cookiejar (PEHSTR_EXT)
- email.base64mime (PEHSTR_EXT)
- multiprocessing.resource_tracker (PEHSTR_EXT)
- subst.exe (PEHSTR_EXT)
- /Create /tn NvTmRep_CrashReport3_{B2FE1952-0186} /sc MINUTE /tr (PEHSTR_EXT)
- ProcessHacker.exe (PEHSTR_EXT)
- Users\youar (PEHSTR_EXT)
- WSOCK32.dll (PEHSTR_EXT)
- GetExecutingAssembly (PEHSTR_EXT)
- Release\troce.pdb (PEHSTR_EXT)
- Desktop\1 (PEHSTR_EXT)
- FileDelete, %A_ScriptDir%\SN.txt (PEHSTR_EXT)
- click(786, 288,0.4,250) (PEHSTR_EXT)
- click(779,400,0.4,250) (PEHSTR_EXT)
- #32768 ahk_exe AutoHotkey.exe (PEHSTR_EXT)
- C:\src\Solarion2018\Bin32\ (PEHSTR)
- SELECT * FROM Win32_ComputerSystem (PEHSTR_EXT)
- Confuser.Core 1.5.0 (PEHSTR_EXT)
- http://185.215.113.93 (PEHSTR_EXT)
- SOFTWARE\wtu (PEHSTR_EXT)
- Software\Microsoft\Windows\CurrentVersion\Run\ (PEHSTR_EXT)
- MicrosoftWindowsStart MenuProgramsStartupupdater.lnk (PEHSTR_EXT)
- Discord Link : v1.0.0-custom (PEHSTR_EXT)
- ShellExecute (PEHSTR_EXT)
- Oreans.vxd (PEHSTR_EXT)
- Software\Wine (PEHSTR_EXT)
- %userappdata%\RestartApp.exe (PEHSTR_EXT)
- 2DJS2 (PEHSTR_EXT)
- bitcoinminingsoftware.Bitcoin_Grabber (PEHSTR_EXT)
- bitcoinminingsoftware.pdb (PEHSTR_EXT)
- Clipper.exe (PEHSTR_EXT)
- AssemblyDescriptionAttribute (PEHSTR_EXT)
- mogu.exe (PEHSTR_EXT)
- Clipper\Clipper\bin\Release\Obfuscated\Inc.Infrastructur Host driver.pdb (PEHSTR_EXT)
- C:\Users\jon doe\Desktop\Registry\Registry\obj\Release\Registry.pdb (PEHSTR_EXT)
- My.Computer (PEHSTR_EXT)
- Registry.exe (PEHSTR_EXT)
- StringComparison (PEHSTR_EXT)
- Application Data\Clipper (PEHSTR_EXT)
- BTC Clipper.pdb (PEHSTR_EXT)
- \Windowslib.exe (PEHSTR_EXT)
- HidenProces.pdb (PEHSTR_EXT)
- /Create /tn MicrosoftDriver /sc MINUTE /tr (PEHSTR_EXT)
- card.php (PEHSTR_EXT)
- ChromeUpdate.exe (PEHSTR_EXT)
- Software\Microsoft\Windows\CurrentVersion\Run (PEHSTR_EXT)
- set_UseShellExecute (PEHSTR_EXT)
- System.Security.Cryptography.AesCryptoServiceProvider (PEHSTR_EXT)
- noSXPFMbbZh2Bafej4.bKHDLoYx25MeUohwr7 (PEHSTR_EXT)
- rJqNEeiWXDvJsanTbLjIo4HO (PEHSTR_EXT)
- 185.215.113.8 (PEHSTR_EXT)
- tsrv3.ru (PEHSTR_EXT)
- tsrv4.ws (PEHSTR_EXT)
- tldrbox.top (PEHSTR_EXT)
- tldrhaus.top (PEHSTR_EXT)
- tldrzone.top (PEHSTR_EXT)
- \Microsoft\Windows\Start Menu\Programs\StartUp (PEHSTR_EXT)
- BIOS System.exe (PEHSTR_EXT)
- 239.255.255.250 (PEHSTR_EXT)
- 185.215.113.84 (PEHSTR_EXT)
- /c start .\%s & start .\%s\VolDriver.exe (PEHSTR_EXT)
- desktop.ini (PEHSTR_EXT)
- >AUTOHOTKEY SCRIPT< (PEHSTR_EXT)
- PasswordsList.txt (PEHSTR_EXT)
- scr.jpg (PEHSTR_EXT)
- System.txt (PEHSTR_EXT)
- ip.txt (PEHSTR_EXT)
- cmd /C "start "q" (PEHSTR_EXT)
- Users\Awar (PEHSTR_EXT)
- Setup.pdb (PEHSTR_EXT)
- main.HideWindow (PEHSTR_EXT)
- main.createWallets (PEHSTR_EXT)
- cryptoStealer/proccess64/main.go (PEHSTR_EXT)
- proccess64/domain/App/replace.ReplaceWallet (PEHSTR_EXT)
- github.com/go-telegram-bot-api/telegram-bot-api (PEHSTR_EXT)
- github.com/atotto/clipboard.WriteAll (PEHSTR_EXT)
- github.com/AllenDang/w32 (PEHSTR_EXT)
- github.com/technoweenie/multipartstreamer (PEHSTR_EXT)
- dba692117be7b6d3480fe5220fdd58b38bf.xyz/API/2/configure.php? (PEHSTR_EXT)
- key.cocotechnology.tech/autologin (PEHSTR_EXT)
- Ready For Execution! (PEHSTR_EXT)
- CocoBytecode.dll (PEHSTR_EXT)
- TEMP%\Indicium-Supra.log (PEHSTR_EXT)
- Silent Miner.pdb (PEHSTR_EXT)
- EvilShit\BTC Wallet Changer (PEHSTR_EXT)
- wscript.exe /E:jscript (PEHSTR_EXT)
- WinExec (PEHSTR_EXT)
- RtlSetProcessIsCritical (PEHSTR_EXT)
- WsP/Vycd5eiHgC0WhpYMwskAjWF6ha5cQ1zwNEheUy0= (PEHSTR_EXT)
- Si-paling-umberela\Growtopia MultiBot (PEHSTR_EXT)
- project-umbrella.pdb (PEHSTR_EXT)
- Realtek.exe (PEHSTR_EXT)
- 23.88.125.20 (PEHSTR_EXT)
- CSClipper.pdb (PEHSTR_EXT)
- (?:[13][a-km-zA-HJ-NP-Z1-9]{25,34})src\main.rs (PEHSTR_EXT)
- DJSHDHFEKFDMVC (PEHSTR_EXT)
- 79.137.196.121 (PEHSTR_EXT)
- XPdriver.exe (PEHSTR_EXT)
- ComputeHash (PEHSTR_EXT)
- Lona.pdb (PEHSTR_EXT)
- TrafficProgrammerv2.exe (PEHSTR_EXT)
- \stub\x64\Release\stub.pdb (PEHSTR_EXT)
- \b(0x[a-fA-F0-9]{40}) (PEHSTR_EXT)
- \b(([13]|bc1)[A-HJ-NP-Za-km-z1-9]{27,34}) (PEHSTR_EXT)
- M@oUCC/_I3P3?b/p\[-P8);I8".resources (PEHSTR_EXT)
- BNG}/I9h6x|>\*zj95u$.resources (PEHSTR_EXT)
- BitcoinClipboardMalware-1-master\btcclipboard\x64\Release\avery.pdb (PEHSTR_EXT)
- FNinternal.exe (PEHSTR_EXT)
- O.N.resources (PEHSTR_EXT)
- H4sIAAAAAAAEAPPwsMrNBQAO/K06BQAAAA== (PEHSTR_EXT)
- PokemonSystem.Resources.resources (PEHSTR_EXT)
- bnb1fga0zpcwsvwv32rx6kzt8gmukwrcjm36cjsavm (PEHSTR_EXT)
- tron.mhxieyi (PEHSTR_EXT)
- Release\Clipper.pdb (PEHSTR_EXT)
- Clipper-5059811751\clipper2.0.pdb (PEHSTR_EXT)
- \Clipez\x64\Debug\Clipez.pdb (PEHSTR_EXT)
- \Microsoft\Windows\Start Menu\Programs\Startup\Update.exe (PEHSTR_EXT)
- [4|8]([0-9]|[A-B])(.){93} (PEHSTR_EXT)
- WinServiceSE.g.resources (PEHSTR_EXT)
- WinServiceSE.pdb (PEHSTR_EXT)
- FileDelete, nr.bcn (PEHSTR_EXT)
- SharpClipboard.exe (PEHSTR_EXT)
- Telegram.Bot (PEHSTR_EXT)
- Regex.Match(GetText (PEHSTR_EXT)
- Convert.ToString(PatternRegex (PEHSTR_EXT)
- ClipperBuild.g.resources (PEHSTR_EXT)
- costura.dotnetzip.pdb.compressed (PEHSTR_EXT)
- vhsposion.xyz (PEHSTR_EXT)
- 146.19.213.248 (PEHSTR_EXT)
- Jellybeans.exe (PEHSTR_EXT)
- CryptoLauncher.Properties.Resources (PEHSTR_EXT)
- (^|\s)[13]{1}[a-km-zA-HJ-NP-Z1-9]{25,34}($|\s) (PEHSTR_EXT)
- |\s)bnb[a-zA-Z0-9]{38,40}($|\s) (PEHSTR_EXT)
- Software\Microsoft\Windows\CurrentVersion\RunOnce (PEHSTR_EXT)
- Local\ExitCliper (PEHSTR_EXT)
- trades.g.resources (PEHSTR_EXT)
- main.importClipboard (PEHSTR_EXT)
- PEGASUS_LIME.Design.Algorithmos.Overkill (PEHSTR_EXT)
- PEGASUS_LIME.Properties.Resources.resources (PEHSTR_EXT)
- PEGASUS_LIME.Properties (PEHSTR_EXT)
- Users\Public\Downloads\TeamViewer_Service.exe (PEHSTR_EXT)
- tron.mhxieyi.com (PEHSTR_EXT)
- Users\Public\Downloads\ZTXClientn.exe (PEHSTR_EXT)
- rusqbxgs.000webhostapp.com/1.txt (PEHSTR_EXT)
- reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run (PEHSTR_EXT)
- schtasks.exe /create /sc (PEHSTR_EXT)
- clipper-1.1\Release\clipper-1.1.pdb (PEHSTR_EXT)
- iuuq;00pdtq/ejhjdfsu/dpn1D (PEHSTR_EXT)
- xxx/ejhjdfsu/dpn2 (PEHSTR_EXT)
- zgfn.My (PEHSTR)
- fgxg.exe (PEHSTR)
- nahu112.exe (PEHSTR_EXT)
- ://api.telegram.org/bot (PEHSTR_EXT)
- /sendMessage?chat_id= (PEHSTR_EXT)
- Steal.g.resources (PEHSTR_EXT)
- Steal.exe (PEHSTR_EXT)
- KMSAutoLite.Properties (PEHSTR_EXT)
- 89.119.67.154/ (PEHSTR_EXT)
- kukutrustnet777.info (PEHSTR_EXT)
- ChromiumData.exe (PEHSTR_EXT)
- Software\edisys\eNotePad (PEHSTR_EXT)
- /panel/gate.php (PEHSTR_EXT)
- wallet. Replacing (PEHSTR_EXT)
- [INFO] tor.exe found, skipping download (PEHSTR_EXT)
- start C:\Windows\Runtime Broker.exe (PEHSTR_EXT)
- C:\Windows\System32\svchost (PEHSTR_EXT)
- Tgbot/Telegram Bot Base/bin (PEHSTR_EXT)
- main.fetchAndDecrypt (PEHSTR_EXT)
- main.trySend (PEHSTR_EXT)
- \b4[0-9AB][1-9A-HJ-NP-Za-km-z]{93}\b (PEHSTR_EXT)
- \bbitcoincash:[a-zA-HJ-NP-Z0-9]{26,42}\b (PEHSTR_EXT)
- 121>1G1R1\1b1h1n1 (PEHSTR_EXT)
- /c schtasks /create /tn "{0}" /tr "{1}" /SC MINUTE /MO 1 /IT /F (PEHSTR_EXT)
- SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon (PEHSTR_EXT)
- cc_Config.exe (PEHSTR_EXT)
- Confuser.Core (PEHSTR_EXT)
- Clipper.My.Resources (PEHSTR_EXT)
- System.Security.Cryptography.CAPIBase+CMSG_KEY_AGREE_PUBLIC_KEY_RECIPIENT_INFO (PEHSTR_EXT)
- H4sIAAAAAAAEAHMud/X3Ckz3dM90C/B3Ck1yrUiv8DAoNnSv8PRIDKlwDzVMCQ2MiEoEAJJZGpYoAA (PEHSTR_EXT)
- UserOOBEBroker.exe (PEHSTR_EXT)
- b(1|3|bc1)[a-zA-HJ-NP-Z0-9]{25,42}\b (PEHSTR_EXT)
- b0x[a-fA-F0-9]{40}\b (PEHSTR_EXT)
- b(L|M)[a-zA-HJ-NP-Z0-9]{26,34}\b (PEHSTR_EXT)
- H;\$@r (PEHSTR_EXT)
- !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT)
- rundll32 (PEHSTR_EXT)
- !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT)
- !#HSTR:ExecutionGuardrails (PEHSTR_EXT)
- !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)e3888ed6bc225dc6656ee02a4dcd5608f7901ebfb6ba665fc3a5e0956c40621eQuarantine the affected machine from the network. Allow the antivirus to remove the detected files and run a full system scan. Manually inspect and remove persistence mechanisms found in Task Scheduler and the Windows 'Run' registry keys.