MSIL/FilecoderArgus.DB7A!tr.ransom
Analysis
MSIL/FilecoderArgus.DB7A!tr.ransom is a detection for a Ransomware trojan.
Below are some of its observed characteristics/behaviours:
- This malware has the capability to detect some debugging tools and stall execution of this malware if it finds these tools to be running.
- This malware may drop any of the following file(s):
- "ARGUS-DECRYPT.html": This file is html file and will serve as ransom notes.
- %Currentuser%\audiodg.exe : This is the utility sdelete.exe, the malware uses this to ensure that recovery of files are much more difficult.
- %AppData%\Local\Temp\wallpaper.bmp: This file is a picture and will serve as ransom notes.
- This Ransomware also changes desktop background to ransom notes using %AppData%\Local\Temp\wallpaper.bmp.
- Affected files of this Ransomware will use the filenaming format {original name+ext}.ARGUS.
- This malware may connect to any of the following remote sites(s):
- hxxp:88.99.{Removed}.31
- hxxp:88.99.{Removed}.31
- Affected victims of this Ransomware are redirected by the attacker via:
- argusdecrypt@cock.li
- argusdecrypt@mailfence.com
- Below is an illustrations of this malware:
- Figure 1: Ransom notes.
- Figure 2: Ransom notes.
- Figure 3: AntiDebugging.
|
|
Recommended Action
- Make sure that your FortiGate/FortiClient system is using the latest AV database.
- Quarantine/delete files that are detected and replace infected files with clean backup copies.
Telemetry
Detection Availability
FortiClient | |
---|---|
Extreme | |
FortiMail | |
Extreme | |
FortiSandbox | |
Extreme | |
FortiWeb | |
Extreme | |
Web Application Firewall | |
Extreme | |
FortiIsolator | |
Extreme | |
FortiDeceptor | |
Extreme | |
FortiEDR |