W32/SDBot!tr

description-logoAnalysis

  • Creates a mutex named memoptimizer  to make sure that there is only one instance of the worm running.
  • Copies itself to the System folder as memoptimize.exe and executes it. It then deletes the original file.
  • Adds the following value to run itself at each Windows startup:
    memory optimizer = "memoptimize.exe"
    to the following subkeys:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices

    Backdoor/Trojan Behavior
  • Attempts to terminate the following processes:
    • AvpM.exe
    • avpcc.exe
    • Avp32.exe

  • Connects to the Internet Relay Chat (IRC) server ihaved.com, joins a channel, and listens for commands that allow the remote attacker to perform any of the following actions:
    • Send user information to server
    • Manage the installation of the back door
    • Control the IRC client on a compromised computer
    • Dynamically update the Trojan
    • Send the Trojan to other IRC channels to attempt to compromise other computers
    • Download and execute files
    • Deliver system and network information to the attacker

recommended-action-logoRecommended Action

    FortiGate systems:
  • Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option

Telemetry logoTelemetry

Detection Availability

FortiGate
Extreme
FortiClient
Extended
FortiMail
Extended
FortiSandbox
Extended
FortiWeb
Extended
Web Application Firewall
Extended
FortiIsolator
Extended
FortiDeceptor
Extended
FortiEDR

Version Updates

Date Version Detail
2024-01-10 92.00520
2023-12-25 92.00041
2023-11-30 91.09302
2023-11-06 91.08566
2021-10-12 89.05871
2021-07-28 87.00957
2021-04-13 85.00424
2021-01-25 83.55400 Sig Added
2020-09-08 80.22400 Sig Updated
2020-08-11 79.55200 Sig Updated