W32/SpyVoltar.A!tr

description-logoAnalysis


  • Upon execution, it drops the following files:
    • undefinedAppDataundefined\system.log
    • undefinedAppDataundefined\taskhost.exe

  • The dropped file taskhost.exe  is also detected as W32/SpyVoltar.A!tr, and is almost an exact copy of the original malware itself with just a slight modification in the header.

  • The dropped file system.log  is an encrypted non-executable file, which is most likely kept by the malware to log its own activities.

  • The malware creates the following registry entry to automatically execute itself every time the infected user logs on:
    • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
      • Taskhost = "undefinedAppDataundefined\taskhost.exe"

  • The malware has been observed to connect to the following remote sites:
    • 37.1.{Removed}.127:80
    • 37.1.{Removed}.127:80
    • 50.62.{Removed}.103:80


recommended-action-logoRecommended Action

    FortiGate Systems
  • Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option.
    FortiClient Systems
  • Quarantine/delete files that are detected and replace infected files with clean backup copies.

Telemetry logoTelemetry

Detection Availability

FortiGate
FortiClient
FortiAPS
FortiAPU
FortiMail
FortiSandbox
FortiWeb
Web Application Firewall
FortiIsolator
FortiDeceptor
FortiEDR

Version Updates

Date Version Detail
2023-06-27 91.04592
2023-06-27 91.04590
2023-06-27 91.04583
2023-05-12 91.03183
2022-12-27 90.09105
2022-12-20 90.08897
2022-12-12 90.08671
2022-11-10 90.07720
2022-11-10 90.07716
2022-11-10 90.07695