W32/SpyVoltar.A!tr
Analysis
- Upon execution, it drops the following files:
- undefinedAppDataundefined\system.log
- undefinedAppDataundefined\taskhost.exe
- The dropped file taskhost.exe is also detected as W32/SpyVoltar.A!tr, and is almost an exact copy of the original malware itself with just a slight modification in the header.
- The dropped file system.log is an encrypted non-executable file, which is most likely kept by the malware to log its own activities.
- The malware creates the following registry entry to automatically execute itself every time the infected user logs on:
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- Taskhost = "undefinedAppDataundefined\taskhost.exe"
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
- The malware has been observed to connect to the following remote sites:
- 37.1.{Removed}.127:80
- 37.1.{Removed}.127:80
- 50.62.{Removed}.103:80
Recommended Action
- FortiGate Systems
- Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option.
FortiClient Systems
- Quarantine/delete files that are detected and replace infected files with clean backup copies.
Telemetry
Detection Availability
FortiGate | |
---|---|
FortiClient | |
FortiAPS | |
FortiAPU | |
FortiMail | |
FortiSandbox | |
FortiWeb | |
Web Application Firewall | |
FortiIsolator | |
FortiDeceptor | |
FortiEDR |