Concrete signature match: TrojanDropper for JavaScript platform, family CryptBot
This threat, TrojanDropper:JS/CryptBot!AMTB, is a JavaScript-based dropper and information stealer. It targets multiple web browsers to exfiltrate sensitive data like login credentials and cookies, communicates with a command-and-control server, and likely drops additional malware payloads.
Relevant strings associated with this threat: - COMSPEC %s /c del %s (PEHSTR_EXT) - %SystemRoot%\System32\svchost.exe -k netsvcs (PEHSTR_EXT) - \update.ini (PEHSTR_EXT) - ServiceDllUnloadOnStop (PEHSTR_EXT) - file.data (PEHSTR_EXT) - //update-ledger.net/update (PEHSTR_EXT) - .rsrc (PEHSTR_EXT) - .rsrc (PEHSTR_EXT) - `.rsrc (PEHSTR_EXT) - .idata (PEHSTR_EXT) - t.me/m08mbk (PEHSTR_EXT) - Browsers\Cookies\Google (PEHSTR_EXT) - Google\Chrome\ (PEHSTR_EXT) - \Default\LoginData (PEHSTR_EXT) - \Default\Cookies (PEHSTR_EXT) - Browsers\Cookies\Opera (PEHSTR_EXT) - Opera Software\ (PEHSTR_EXT) - \LoginData (PEHSTR_EXT) - \Cookies (PEHSTR_EXT) - Browsers\Cookies\360 (PEHSTR_EXT) - 360Chrome\Chrome\ (PEHSTR_EXT) - Browsers\Cookies\CocCoc (PEHSTR_EXT) - CocCoc\Browser\ (PEHSTR_EXT) - Browsers\Cookies\Comodo (PEHSTR_EXT) - Comodo\Dragon\ (PEHSTR_EXT) - Browsers\Cookies\Slimjet (PEHSTR_EXT) - Slimjet\ (PEHSTR_EXT) - Browsers\Cookies\Cent (PEHSTR_EXT) - CentBrowser\ (PEHSTR_EXT) - Browsers\Cookies\Torch (PEHSTR_EXT) - Torch\ (PEHSTR_EXT) - wallet.datd (PEHSTR_EXT) - logins.jsond (PEHSTR_EXT) - cookies.sqlited (PEHSTR_EXT) - Passwords.txtd (PEHSTR_EXT) - Screen.jpg (PEHSTR_EXT) - Comodo (PEHSTR_EXT) - /uJDp (SNID) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
6c8cc3088a9f3f4d2d4ae123297b81d8ab86893cfad1bb992b5b0111eb2d7e21Isolate the infected system immediately. Perform a full system scan with an updated antivirus solution and remove all detected malicious files. Force a password reset for all online accounts accessed from the compromised machine, especially for banking, email, and social media, and enable multi-factor authentication where available. Investigate for further indicators of compromise, such as persistent services, suspicious processes, or unusual network activity.