Trojan.Polazert
ThreatDown is now the name of the Malwarebytes line of business products. References to Malwarebytes below reflect the amazing technology used to first identify the threat.
Short bio
Trojan.Polazert is Malwarebytes’ detection name for a .NET Remote Access Trojan (RAT) that acts as a backdoor.
Type of infection
There are several campaigns that distribute Trojan.Polazert. In general they use SEO and social engineering to get victims to download the RAT disguised as a document. Trojan.Polazert is specifically designed to steal credentials from browsers and provide the attacker with a backdoor to further compromise infected systems. To achieve this collected data are sent to a C&C server.
Malicious behavior
Trojan.Polazert adds shortcuts to the Startup folder and changes existing shortcuts on the victim’s computer to gain persistence.
Aftermath
The backdoor component of Trojan.Polazert can be used to install further malware on the infected system. As of yet there is no fixed follow-up payload.
Protection
Malwarebytes blocks Trojan.Polazert
Home remediation
You can use the Malwarebytes Anti-Malware Nebula console to scan endpoints.
Nebula endpoint tasks menu
Choose the Scan + Quarantine option. Afterwards you can check the Detections page to see which threats were found.
On the Quarantine page you can see which threats were quarantined and restore them if necessary.