W32/FORUCON.BME!tr
Analysis
- Creates the following copies of itself:
- undefinedAppDataundefined\[RandomLetters1].exe
- undefinedAppDataundefined\[RandomLetters1].pre
- undefinedAppDataundefined\[RandomLetters2]\[RandomLetters1].exe
- undefinedAppDataundefined\[RandomLetters2]\[RandomLetters1].pre
- Creates the following registry entry to automatically run its dropped copy during startup:
- key: HKCU\Software\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
- value: [RandomLetters3]
- data: "undefinedAppDataundefined\[RandomLetters1].exe", or "undefinedAppDataundefined\[RandomLetters1].pre"
- Displays a fake error message box, such as the following:
- Title: "Windows Explorer"
- Message: "Windows cannot open the file. The Windows might not support the file type or might not support the codec that was used to compress the file."
- Attempts to connect to a command-and-control (C&C) server to await further instructions and commands such as downloading other malicious files. The address of the C&C server is generated with a domain generation algorithm (DGA).
Recommended Action
- Make sure that your FortiGate/FortiClient system is using the latest AV database.
- Quarantine/delete files that are detected and replace infected files with clean backup copies.
Telemetry
Detection Availability
FortiGate | |
---|---|
Extreme | |
FortiClient | |
Extended | |
FortiMail | |
Extended | |
FortiSandbox | |
Extended | |
FortiWeb | |
Extended | |
Web Application Firewall | |
Extended | |
FortiIsolator | |
Extended | |
FortiDeceptor | |
Extended | |
FortiEDR |