W32/Procil.A

description-logoAnalysis

This is a 32-bit keylogger with a file size of 100,572 bytes. This Trojan may have been spammed to email recipients by a malicious user in an effort to maximize the chance of someone executing the file.
If the Trojan is run, it will copy itself to the System32 folder as "Explorer.exe" and then run the copy. When "Explorer.exe" is run, it loads as a task and is visible using the utility Task Manager. The Trojan will then begin to gather sensitive information and store as two files - ".s" and ".l".
Contents of data files:
.s - machine information such as attached drives, environment variables, etc.
.l - clipboard memory, list of running applications and processes
SMTP Outbound Messages
The Trojan then combines the two files into a .ZIP renamed as "Log0.kla". An email message is sent to the author of the Trojan along with the attached file. The email message is in this format -
From: SCKLPRO <admin@kaplishnetwork.com>
To: <ajeeb@hotpop.com>
Subject: Report of undefinedMachine Nameundefined
Body:
SC-KeyLog Activity Report
AutoKill: This Engine will delete itself after 2048 days from now.
See attached file...
Document created by SC-KeyLog

Attachment: "Log0.kla"

recommended-action-logoRecommended Action

Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option

Telemetry logoTelemetry

Detection Availability

FortiGate
Extended
FortiClient
Extreme
FortiAPS
FortiAPU
FortiMail
Extreme
FortiSandbox
Extreme
FortiWeb
Extreme
Web Application Firewall
Extreme
FortiIsolator
Extreme
FortiDeceptor
Extreme
FortiEDR