W32/Emogen.Y!tr
Analysis
W32/Emogen.Y!tr is a generic detection for a type of trojan that uses a polymorphic custom packer. Since this is a generic detection, malware that are detected as W32/Emogen.Y!tr may have varying behavior.
- Some examples of malware that use this packer are the following:
- ransomware
- downloader
- This malware may also have the capability to connect to external servers. One sample has been observed to open a Microsoft Internet Explorer Window with the address pointing to www.1a2a3a.cn.
- Some samples are also observed to drop files in folders such as undefinedAllUsersProfileundefined\Application Data or undefinedProgramFilesundefined.
Recommended Action
FortiGate Systems
- Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option.
FortiClient Systems
- Quarantine/delete files that are detected and replace infected files with clean backup copies.
Telemetry
Detection Availability
FortiGate | |
---|---|
Extended | |
FortiClient | |
FortiMail | |
FortiSandbox | |
FortiWeb | |
Web Application Firewall | |
FortiIsolator | |
FortiDeceptor | |
FortiEDR |