Concrete signature match: Trojan Downloader - Downloads additional malware for 32-bit Windows platform, family Nemucod
TrojanDownloader:Win32/Nemucod is a highly malicious downloader that uses scripting (WScript.Shell), system utilities like rundll32.exe, regsvr32.exe, mshta.exe, and PowerShell for execution, persistence, and to retrieve additional payloads. It is capable of downloading files via HTTP using BITS, dropping them to specific locations, and establishing persistence through methods like scheduled tasks or DLL registration, often leading to more severe infections like ransomware.
Relevant strings associated with this threat:
- ("esj.")) (MACROHSTR_EXT)
- .CreateObject(vb_ (MACROHSTR_EXT)
- ("llehS.tpircSW")) (MACROHSTR_EXT)
- http (MACROHSTR_EXT)
- /crypt.dll (MACROHSTR_EXT)
- C:\rncwner\ (MACROHSTR_EXT)
- .dll DllRegisterServer (MACROHSTR_EXT)
- rundll32.exe (MACROHSTR_EXT)
- ShellExecuteA (MACROHSTR_EXT)
- !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT)
- rundll32 (PEHSTR_EXT)
- !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
- !#HSTR:StringCodeForSoftwarePacking.C!pli (PEHSTR_EXT)ba04e23dd6e8c8cd97b7932a319f33aa55ab905d5e53750846ca474b71b55f880b35f71757222ab1e86335db014562d98a5eedb456e04266c3ed90d442b0415153e0c959d2e562075d89751c12491edd1fca766ce9f5ebc72c807e6f9ad1ea2a6c3d889d004469be888abc69b2abc3e30ae1933f86b5eb0df840d9ce55eca4342b42508d21c45eca4f626ebfce0f6e7aae40639d3e124512363312399ff614adIsolate the affected system immediately. Perform a full system scan with updated endpoint protection, remove all detected malicious files, and eliminate any established persistence mechanisms (e.g., registry entries, scheduled tasks, startup items). Thoroughly investigate for secondary infections as Nemucod's primary role is to download further malware.