This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
Some variants have been observed evading the sinkhole and distributing additional malware in November 2018.
Virut spreads by injecting code into any executable or screensaver file that is accessed. It also injects malicious iframes into HTML, PHP and ASP files. This means that Virut can be distributed to additional devices via network shares, removable drives and malvertising. The most recent variants inject code into the winlogon.exe process.
Virut is known to utilise a domain generation algorithm and an encrypted protocol with RSA signature verification for command and control signalling. When a communication link has been established using the most recent variants, the affected device is instructed to download a portable executable file. This attempts to drop further payloads over HTTP, using the user agent 'AdInstall'.
Remediation steps
| Type | Step |
|---|---|
|
To prevent and detect a trojan infection, ensure that:
|
Last edited: 17 February 2020 12:59 pm