HUGOK 0 Posted October 10, 2024 Posted October 10, 2024 (edited) I use it Endpiont Security 11.1.2052. Today, an employee opened the infected Trojan NSIS/Injector.DBG file, the file had the extension *pdf.img. For the first time, ESET was unable to remove Tojan, it turned out that it had created a Virtual Disk on which it had saved the infected file. For now, I have uninstalled Virtual Disk and am doing a full scan Edited October 10, 2024 by HUGOK
Administrators Marcos 5,725 Posted October 10, 2024 Administrators Posted October 10, 2024 It's unlikely that a NSIS/Injector would be that advanced and created a virtual disk. If you still have the malicious sample or at least its hash, please provide it. Also provide logs collected with ESET Log Collector. I take it that the malware has been cleaned completely and there are no issues, is that correct?
HUGOK 0 Posted October 10, 2024 Author Posted October 10, 2024 (edited) I have an infected message on the mail server, I can send it for analysis and to check why Eset was unable to remove it from the created Virtual Disk. Please provide only the address to which I can send it. Edited October 10, 2024 by HUGOK
itman 1,921 Posted October 10, 2024 Posted October 10, 2024 (edited) 6 hours ago, Marcos said: It's unlikely that a NSIS/Injector would be that advanced and created a virtual disk My guess is a PowerShell script was used to silently create the virtual drive. Manual method show below. Substitute .img for .iso; Quote Mount ISO image command To mount an ISO image using a PowerShell command, use these steps: Open Start. Search for PowerShell, right-click the top result, and select the Run as administrator option. Type the following command to mount an ISO image and press Enter:Mount-DiskImage -ImagePath "PATH\TO\ISOFILE"In the command, make sure to replace the "PATH\TO\ISOFILE" with the actual path of the .iso file.For example, this command mounts an image in the "E:\" virtual drive:Mount-DiskImage -ImagePath "E:\Windows10.iso" https://www.windowscentral.com/how-mount-or-unmount-iso-images-windows-10 Edited October 10, 2024 by itman
HUGOK 0 Posted October 11, 2024 Author Posted October 11, 2024 (edited) After running the infected file, an additional disk was created simulating a DVD drive, drive D, and the infected file was automatically saved on it. Eset was unable to remove it and I don't know why it allowed the creation of such a disk, i.e. the virus was not blocked by the program. After removing the created drive from the device manager and thoroughly scanning it, everything is ok for now Edited October 11, 2024 by HUGOK
Administrators Marcos 5,725 Posted October 11, 2024 Administrators Posted October 11, 2024 The malicious file has a double extension (.pdf.img). As an img file, Windows mounts it automatically as a virtual drive when you open it. If detected, after a reboot the image won't be mounted and the NSIS installer will be deleted.
Recommended Posts