Concrete signature match: Trojan Spy - Monitors and reports user activity for 32-bit Windows platform, family Rebhip
TrojanSpy:Win32/Rebhip!pz is a Concrete detection for a sophisticated Remote Access Trojan (RAT) and spyware, explicitly linked to the Spy-Net RAT and potentially Cerberus techniques. It targets credentials from browsers and other applications, establishes proxy connections for C2, and utilizes API hooking and abuse of legitimate Windows binaries like mshta, regsvr32, and rundll32 for stealth and persistence, indicating deep system compromise and data exfiltration capabilities.
Relevant strings associated with this threat: - XX--XX--XX.txt (PEHSTR_EXT) - MSN.abc (PEHSTR_EXT) - FIREFOX.abc (PEHSTR_EXT) - IELOGIN.abc (PEHSTR_EXT) - IEPASS.abc (PEHSTR_EXT) - c:\sexy.lnk (FILEPATH) - d:\sexy.lnk (FILEPATH) - e:\sexy.lnk (FILEPATH) - borlo 1.9.7 src\WindowsApplication1\obj\Debug\Winlogon.pdb (PEHSTR_EXT) - (yTt*.h (SNID) - funcoes.dll (PEHSTR_EXT) - StartHttpProxy (PEHSTR_EXT) - UnitComandos (PEHSTR_EXT) - xxxyyyzzz.dat (PEHSTR_EXT) - SOFTWARE\Cerberus (PEHSTR_EXT) - PleaseStop.spy (PEHSTR_EXT) - \Spy-Net [RAT] (PEHSTR_EXT) - \Server\PluginDll (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT) - !#HSTR:StringCodeForScheduledTask.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForDataEncoding.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.J!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.K!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteFileCopy.B!pli (PEHSTR_EXT) - !#HSTR:ExecutionGuardrails (PEHSTR_EXT) - !#HSTR:StringCodeForFileDeletion.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.M!pli (PEHSTR_EXT) - !#HSTR:StringCodeForNetshHelperDLL.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRemoteServices.A!pli (PEHSTR_EXT)
de12a7b95189ae2a83ea2a57212b49b4187885edb1c89b584121cf9c99525883Immediately isolate the affected system from the network. Perform a full system scan with updated antivirus software in safe mode to remove all detected malware components. Change all compromised credentials (email, banking, etc.) and monitor for suspicious activity. A full system re-image is strongly recommended to ensure complete eradication.