FortiGuard Labs Threat Research

FortiGuard Labs Discovers New Covid-22 Malware Targeting MBR

By Shunichi Imano and Fred Gutierrez | November 11, 2021

Even now, almost two years after the COVID-19 pandemic started, there is no sign that cybercriminals will stop taking advantage of the situation as an attack vector. This time, however, this attacker uses a COVID pandemic that has not yet happened as bait. FortiGuard Labs recently discovered a new malware posing as a mysterious Covid-22 installer. While containing many of the features of "joke" malware, it is also destructive, causing infected machines to fail to boot. Because it has no features for encrypting data demanding a ransom to undo the damage it inflicts, it is instead a new destructive malware variant designed to render affected systems inoperable. This blog explains how this malware works.

Affected platforms: Microsoft Windows
Impacted parties: Windows Users
Impact: Unable to boot the machine
Severity level: Medium

What is Covid-22 Malware?

The malware file is named Covid22. For those unfamiliar with the naming scheme, COVID-19 is a short form of Coronavirusdisease, and 19 represents the year the outbreak was first identified. The file name Covid-22 plays off the current Coronavirus disease but applies that same image of fear and destruction to computers, potentially creating a cyber-pandemic in 2022. While we don't know how exactly the malware was distributed, the malware author has tried to weaponize fear as bait to lure victims into opening the file.

Covid-22 Malware in Action

While the malware itself is not sophisticated, it does take several actions designed to put fear into the victim before inducing true panic. But before that, when first manually running the file, it asks whether the potential victim wants to install Covid-22 on their machine as if it were an application. 

Figure 1. Installer screen that asks the victim for permission to install

Once the victim proceeds with the installation, the malware drops several malicious files before forcefully rebooting the machine. Dropped files have file names that are simple and self-described for their actions. They are listed below in sequence of execution.

  • Covid22Server.exe executes the commands in the dropped script.txt
  • lol.vbs creates an endless loop of a MessageBox with "Your PC has been infected by Covid-22 Corona Virus! Enjoy the death of your pc!"
Figure 2. Image of the pop-up message “Your PC has been infected by Covid-22 Corona Virus! Enjoy the death of your pc!”
  • speakwh.vbs uses the computer's speaker to say "coronavirus" in a loop
  • CoronaPopup.exe displays a pop-up with the title "Covid-22 has infected your pc!" and an image of the actual coronavirus
Figure 3. Image of the virus
  • ClutterScreen.exe clutters the screen by constantly moving blocks of pixels
  • x.vbs displays the pop-up message, "Corona Virus!" 50 times
Figure 4. Image of the pop-up message “Corona Virus!”
  • noescapes.vbs displays the pop-up message "THERE IS NO ESCAPE" 10 times
Figure 5. Image of the pop-up message “THERE IS NO ESCAPE”
  • icons.exe fills the screen with red Xs
Figure 6. Image of the user’s screen filled with red Xs
  • final.vbs displays a pop-up message "Bye!"
Figure 7. Image of the pop-up message “BYE!!!”

Covid-22 Effects on MBR

These are the classic actions of joke programs usually intended to annoy or make fun of users. But the next activity is not laughable at all. The malware drops and executes the malicious WipeMBR.exe wiper malware that destroys the Master Boot Record (MBR) by overwriting its first 512 bytes with zeros. The malware then forces a machine to reboot after displaying the following pop-up message:

Figure 8. Final pop-up message before forcefully rebooting the compromised machine

Because MBR has information about the partitions of the hard drive and acts as a loader for the operating system (OS), the compromised machine will not be able to load the OS upon reboot. The good news for the users is that the malware does not destroy nor steal any files on the compromised device, meaning the victim can still recover user files from the hard drive. The malware also does not demand ransom.

While the result is almost identical to another MBR wiper that Sonicwall posted a blog about in April 2020, our analysis did not show any resemblance in their wiper codes. This newer variant simply overwrites the MBR with zeroes.

How to Repair a Damaged MBR

Fixing an MBR is relatively easy in modern Windows. After the affected machine reboots (sometimes it requires a few reboots), the system enters automatic repair mode. First, choose Advanced Options, Troubleshoot. Another Advanced Option should then let you use the Command Prompt. From the Command Prompt, type and run "bootrec.exe /fixmbr".

An alternative and more straightforward option would be to choose Startup Repair on the screen to run the Command Prompt. The downside of selecting Startup Repair is that it will take longer to complete the job.

If the automatic repair mode does not kick in for some reason, you'll need to boot the system off a recovery disk or drive. Note that you'll need to change your BIOS settings to ensure the system boots from the recovery media first, or else the system will try to boot using the overwritten MBR leading to a boot error. Once the system boots from recovery media, you should be able to choose to run the command prompt, whereby the user can run the command "bootrec.exe /fixmbr".

It is also vital to remind system administrators of the importance of backing up your data on external storage in case any of your files are ever damaged, encrypted, or destroyed. You will also want to create recovery media beforehand, or else you will need to use a working machine, which can be difficult for home users after the damage is done.

Conclusion on Covid-22 Brings Disaster to MBR

What looks to be a mere joke program is designed to bring destruction to impacted systems. This time, luck was on the victim's side as the malware did not touch any user data, but the user may not be so lucky next time. Imagine if the files on the compromised machine had been encrypted or destroyed and could not be recovered. Always be mindful of executing unknown files received from the internet.

Fortinet Protections

Fortinet customers are already protected from this malware by the FortiGuard Labs AntiVirus Service as used by FortiGate, FortiClient and FortiMail, and by FortiEDR as follows:

  • W32/Ursu.558C!tr
  • Malicious_Behavior.SB
  • VBS/BadJoke.8A6B!tr
  • VBS/BadJoke.7182!tr
  • VBS/BadJoke.84AB!tr
  • VBS/BadJoke.0C12!tr
  • VBS/BadJoke.DF52!tr
  • W32/BadJoke.DCAB!tr            

FortiEDR detects the downloaded executable file as malicious based on its behavior.


Sample SHA-256:

Learn more about Fortinet’s FortiGuard Labs threat research and intelligence organization and the FortiGuard Security Subscriptions and Services portfolio.

Learn more about Fortinet’s free cybersecurity training, an initiative of Fortinet’s Training Advancement Agenda (TAA), or about the Fortinet Network Security Expert program, Security Academy program, and Veterans program. Learn more about FortiGuard Labs global threat intelligence and research and the FortiGuard Security Subscriptions and Services portfolio.