W32/SDBot.HY!worm

description-logoAnalysis

This threat is packed with a file size of 107,008. It binds with TCP port 113 to function as a remote access Trojan. This virus connects with various hard-coded IRC servers to await instructions from a malicious user. The virus uses TCP port 5555 to make the connection.
Loading At Windows Startup If this virus is run, it will register itself to run at each Windows startup -
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
"Microsoft Update" = Wuamgrd.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
"Microsoft Update" = Wuamgrd.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\
"Microsoft Update" = Wuamgrd.exe

recommended-action-logoRecommended Action

Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option

Telemetry logoTelemetry

Detection Availability

FortiGate
Extended
FortiClient
FortiMail
FortiSandbox
FortiWeb
Web Application Firewall
FortiIsolator
FortiDeceptor
FortiEDR