Concrete signature match: TrojanDropper for 32-bit Windows platform, family Dapato
This is a concrete detection of TrojanDropper:Win32/Dapato!pz, a malicious program designed to download and execute additional payloads. It establishes persistence, communicates with remote servers (potentially AWS), and leverages techniques like code hooking and MSHTA for execution and evasion, with indications of potential integration with or impersonation of remote access software like AnyDesk.
Relevant strings associated with this threat: - set_UseShellExecute (PEHSTR_EXT) - downexecute (PEHSTR_EXT) - For i = 1 To LenB( OBH.ResponseBody ) (PEHSTR_EXT) - \vxs32.exe (PEHSTR_EXT) - https:// (PEHSTR_EXT) - .amazonaws.com/ (PEHSTR_EXT) - /vxs32.exe (PEHSTR_EXT) - \Software\Microsoft\Windows\CurrentVersion\Policies\System (PEHSTR_EXT) - ServiceApp.exe (PEHSTR_EXT) - Software\Microsoft\Windows\CurrentVersion\Run (PEHSTR_EXT) - BouncyCastle.Crypto (PEHSTR_EXT) - Org.BouncyCastle.Bcpg.OpenPgp (PEHSTR_EXT) - source\repos\AnyDeskAdd.exe\AnyDeskAdd.exe\obj\Debug\AnyDeskAdd.exe.pdb (PEHSTR_EXT) - /public/pages/Exodus.html (PEHSTR_EXT) - \WallpaperX.pdb (PEHSTR_EXT) - config.txt (PEHSTR_EXT) - log.txt (PEHSTR_EXT) - Knocker.Properties.Resources (PEHSTR_EXT) - knksvc.exe (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
a0e0618ef520552e401334c7b22525283ea5d3f2e2c4893e0a2a793dfdb221412787956c2a7e3723c7729ac1fe4f249a9dc194246554249c6e5526c273fb7042bba7457d311c19971a5cb3ff3047edbd4a325a1fa2017024ad5f229720851d836f26c33a253263bf5b63c3591a1d3bd1268faf4b78f1a7fc8b9bc3fdad7c99f5f348584967e1869fce5e6208cd86713dada23c117ae3f65d4bd0393d4c379f12Immediately isolate affected systems and perform a comprehensive scan with up-to-date antivirus definitions to remove all malicious components. Investigate persistence mechanisms (e.g., Run keys, services) and network logs for indicators of compromise or C2 communication, restoring from a clean backup if necessary.