W32/Zbot.AAU!tr
Analysis
- Creates a copy of itself to undefinedApplication Dataundefined\[Random Folder]\[Random File Name].exe.
- Drops the following files:
- undefinedApplication Dataundefined\Microsoft\Address Book\[User Name].wab
- undefinedTempundefined\tmp[Random Values].bat
- Adds the following registry to enable its automatic execution:
- key: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
- value: [Random File Name].exe
- data: undefinedAppDataundefined\[Random Folder]\[Random File Name].exe
- After execution, it deletes its original copy.
- The most common icon used by this malware is that of a PDF document file.
Recommended Action
- FortiGate Systems
- Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option.
FortiClient Systems
- Quarantine/delete files that are detected and replace infected files with clean backup copies.
Telemetry
Detection Availability
FortiGate | |
---|---|
FortiClient | |
FortiAPS | |
FortiAPU | |
FortiMail | |
FortiSandbox | |
FortiWeb | |
Web Application Firewall | |
FortiIsolator | |
FortiDeceptor | |
FortiEDR |
Version Updates
Date | Version | Detail |
---|---|---|
2023-09-12 | 91.06894 | |
2023-07-30 | 91.05561 | |
2022-05-31 | 90.02802 | |
2021-02-16 | 84.08100 | Sig Updated |
2020-11-14 | 81.83700 | Sig Updated |
2020-06-16 | 78.20800 | Sig Updated |
2020-06-02 | 77.87200 | Sig Updated |
2020-05-12 | 77.37200 | Sig Updated |
2020-04-21 | 76.87400 | Sig Updated |
2020-04-21 | 76.87100 | Sig Updated |