W32/Generic.B!tr.bdr

description-logoAnalysis

  • Copies itself to the System folder as wnsvc.exe.
  • Adds the following value to run itself at each Windows startup:
    WN Services = "undefinedSystemundefined\wnsvc.exe"
    to the following subkey:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
    Note: undefinedSystemundefined refers to the System folder.
  • Drops the file uninstall.bat  to the Temporary folder. This file is used to delete the initially executed copy of itself.
  • Connects to the one of the following Internet Relay Chat (IRC) servers using TCP port 6564:
    • micro.leetshiz.com
    • micro.nunyah.info

    When connected, it listens for commands that allow the remote attacker to perform any of the following actions:
    • Deliver system information to attacker
    • Download file
    • Execute file
    • Kill process
    • Perform DDoS attack
    • Perform network scan
    • Start spreading routine

  • Propagates by exploiting the Microsoft ASN.1 Library Bit String Processing Variant Heap Corruption Vulnerability.

recommended-action-logoRecommended Action

    FortiGate systems:
  • Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option.
    Patch
  • Download and install the patch for the Microsoft ASN.1 Library Bit String Processing Variant Heap Corruption Vulnerability: http://www.microsoft.com/technet/security/bulletin/MS04-007.mspx.

Telemetry logoTelemetry

Detection Availability

FortiGate
Extended
FortiClient
FortiMail
FortiSandbox
FortiWeb
Web Application Firewall
FortiIsolator
FortiDeceptor
FortiEDR

Version Updates

Date Version Detail
2021-06-01 86.00601
2021-05-04 85.00929
2021-04-27 85.00761
2021-04-04 85.00213
2021-03-16 84.00747
2021-02-18 84.13600 Sig Updated
2021-02-16 84.08100 Sig Updated
2021-02-08 83.89600 Sig Updated
2021-01-26 83.57800 Sig Updated
2021-01-10 83.19800 Sig Updated