Home / malwarePDF  

DDoS:Win32/Nitol.B


First posted on 10 October 2012.
Source: Microsoft

Aliases :

There are no other names known for DDoS:Win32/Nitol.B.

Explanation :



DDoSWin32/Nitol.B is a malicious program that is unable to spread of its own accord. It may perform a number of actions of an attacker's choice on an affected computer.

Installation

When executed, DDoSWin32/Nitol.B copies itself to <system folder> folder using a variable file name, for example: kkagks.exe

Note: <system folder> refers to a variable location that is determined by the malware by querying the operating system. The default installation location for the System folder for Windows 2000 and NT is "C:\WinNT\System32"; and for XP, Vista, and 7 it is "C:\Windows\System32".

Payload

Contacts remote hosts

DDoSWin32/Nitol.B may contact the following remote hosts:

  • huanjue6369029.gicp.net using port 1400
  • imddos.my03.com using port 9090


Commonly, malware may contact a remote host for the following purposes:

  • To confirm Internet connectivity
  • To report a new infection to its author
  • To receive configuration or other data
  • To download and execute arbitrary files (including updates or additional malware)
  • To receive instruction from a remote attacker
  • To upload data taken from the affected computer


This malware description was produced and published using our automated analysis system's examination of file SHA1 9efa2e4b63456a124160bb5867af1972a46cd40f.

Last update 10 October 2012

 

TOP