W32/Rux.E!tr.bdr

description-logoAnalysis



  • It drops a copy of itself as undefinedSystemDirundefined\FlyingMarqu.scr.

  • The malware also attempts connection to "wwp.mirabilis.com", note that it used "wwp" instead of "www" and thus would fail this name hosts resolve, mirabilis is a known hosts for ICQ, this malware may possibly intend to using this avenue to obtain backdoor remote commands.


  • recommended-action-logoRecommended Action

    • Make sure that your FortiGate/FortiClient system is using the latest AV database.
    • Quarantine/delete files that are detected and replace infected files with clean backup copies.

    Telemetry logoTelemetry

    Detection Availability

    FortiClient
    Extreme
    FortiMail
    Extreme
    FortiSandbox
    Extreme
    FortiWeb
    Extreme
    Web Application Firewall
    Extreme
    FortiIsolator
    Extreme
    FortiDeceptor
    Extreme
    FortiEDR