W32/Tiny.BW!tr.dldr

description-logoAnalysis

  • Copies itself to the following folders using a random filename:
    • System folder
    • C:\Documents and Settings\User\Local Settings\Application Data

    Autostart Mechanism
  • Adds the following registry entries:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
      [Random] = "undefinedSYSTEMundefined\[Random]"
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
      [Random] = "C:\Documents and Settings\User\Local Settings\Application Data\[Random]"
    Note: [Random] refers to the random filename of the copy of this trojan.
    Backdoor and/or Trojan Behavior
  • Attempts to download files from the following URL:
    http://ad.el{REMOVED}.com/BN/45aTq2V13X
    This site is unavailable as of this writing.

recommended-action-logoRecommended Action

    FortiGate systems:
  • Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option.

Telemetry logoTelemetry

Detection Availability

FortiClient
Extreme
FortiMail
Extreme
FortiSandbox
Extreme
FortiWeb
Extreme
Web Application Firewall
Extreme
FortiIsolator
Extreme
FortiDeceptor
Extreme
FortiEDR

Version Updates

Date Version Detail
2019-08-27 71.17600 Sig Updated
2019-07-22 70.16300 Sig Added
2019-05-21 68.68100 Sig Updated
2019-04-23 68.01000 Sig Added