Concrete signature match: TrojanDropper for 32-bit Windows platform, family Dapato
This is a concrete detection of TrojanDropper:Win32/Dapato!pz, a malicious program designed to download and execute additional payloads. It establishes persistence, communicates with remote servers (potentially AWS), and leverages techniques like code hooking and MSHTA for execution and evasion, with indications of potential integration with or impersonation of remote access software like AnyDesk.
Relevant strings associated with this threat: - set_UseShellExecute (PEHSTR_EXT) - downexecute (PEHSTR_EXT) - For i = 1 To LenB( OBH.ResponseBody ) (PEHSTR_EXT) - \vxs32.exe (PEHSTR_EXT) - https:// (PEHSTR_EXT) - .amazonaws.com/ (PEHSTR_EXT) - /vxs32.exe (PEHSTR_EXT) - \Software\Microsoft\Windows\CurrentVersion\Policies\System (PEHSTR_EXT) - ServiceApp.exe (PEHSTR_EXT) - Software\Microsoft\Windows\CurrentVersion\Run (PEHSTR_EXT) - BouncyCastle.Crypto (PEHSTR_EXT) - Org.BouncyCastle.Bcpg.OpenPgp (PEHSTR_EXT) - source\repos\AnyDeskAdd.exe\AnyDeskAdd.exe\obj\Debug\AnyDeskAdd.exe.pdb (PEHSTR_EXT) - /public/pages/Exodus.html (PEHSTR_EXT) - \WallpaperX.pdb (PEHSTR_EXT) - config.txt (PEHSTR_EXT) - log.txt (PEHSTR_EXT) - Knocker.Properties.Resources (PEHSTR_EXT) - knksvc.exe (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
93ae860b34d78429fd3f4140cb2ca139bed29fa0f81d99cd35dce8f8024b0f0aa0e0618ef520552e401334c7b22525283ea5d3f2e2c4893e0a2a793dfdb221412787956c2a7e3723c7729ac1fe4f249a9dc194246554249c6e5526c273fb7042bba7457d311c19971a5cb3ff3047edbd4a325a1fa2017024ad5f229720851d836f26c33a253263bf5b63c3591a1d3bd1268faf4b78f1a7fc8b9bc3fdad7c99f5Immediately isolate affected systems and perform a comprehensive scan with up-to-date antivirus definitions to remove all malicious components. Investigate persistence mechanisms (e.g., Run keys, services) and network logs for indicators of compromise or C2 communication, restoring from a clean backup if necessary.