W32/Zbot.ANM!tr
Analysis
- Upon execution, it copies itself to the following:
- undefinedSystemundefined\[Random].exe
- The following registry modifications are applied:
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\userinit.exe
- Debugger = "[Random].exe"
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\userinit.exe
- This malware performs a DNS query of the followiing domains:
- MATFIC.COM
- CUBEPAL.COM
- DISIO.NET
- raforngorh.mrbasic.com
- pydneofnro.servegame.com
- After execution, the original copy of the malware deletes itself.
Recommended Action
FortiGate Systems
- Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option.
FortiClient Systems
- Quarantine/delete files that are detected and replace infected files with clean backup copies.
Telemetry
Detection Availability
FortiGate | |
---|---|
Extended | |
FortiClient | |
FortiMail | |
FortiSandbox | |
FortiWeb | |
Web Application Firewall | |
FortiIsolator | |
FortiDeceptor | |
FortiEDR |