W32/Agent.FM!tr
Analysis
- Creates copies of itself to the undefinedSYSTEMundefined folder and undefinedUSERPROFILEundefined folder as reader_s.exe.
- It creates the following registry entries to run its dropped copies at each Windows startup:
- key: HKEY_LOCAL_MACHINE\SoftWare\Microsoft\Windows\CurrentVersion\Run
- value: reader_s
- data: undefinedSYSTEMundefined\reader_s.exe
- key: HKEY_CURRENT_USER\SoftWare\Microsoft\Windows\CurrentVersion\Run
- value: reader_s
- data: undefinedUSERPROFILEundefined\reader_s.exe
- Creates an instance of the process undefinedSYSTEMundefined\svchost.exe and injects malicious codes.
- Deletes itself from the current directory.
- Attempts to download malware files. The downloaded files are either injected into a new instance of the undefinedSYSTEMundefined\svchost.exe process, or saved in the undefinedTEMPundefined folder then executed.
Recommended Action
- FortiGate Systems
- Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the 'Allow Push Update' option.
FortiClient Systems
- Quarantine/delete files that are detected and replace infected files with clean backup copies.
Telemetry
Detection Availability
FortiGate | |
---|---|
Extreme | |
FortiClient | |
Extended | |
FortiMail | |
Extended | |
FortiSandbox | |
Extended | |
FortiWeb | |
Extended | |
Web Application Firewall | |
Extended | |
FortiIsolator | |
Extended | |
FortiDeceptor | |
Extended | |
FortiEDR |