Home / malwarePDF  

DDoS:Win32/Nitol.C


First posted on 10 October 2012.
Source: Microsoft

Aliases :

DDoS:Win32/Nitol.C is also known as TROJ_NITOL.SMB (Trend Micro), Trojan.Win32.Scar.gmkz (Kaspersky).

Explanation :



DDoS:Win32/Nitol.C is a malicious program that is unable to spread of its own accord. It may perform a number of actions of an attacker's choice on an affected computer.



Installation

When executed, DDoS:Win32/Nitol.C copies itself to <system folder>\sscqsw.exe.

Note: <system folder> refers to a variable location that is determined by the malware by querying the operating system. The default installation location for the System folder for Windows 2000 and NT is "C:\WinNT\System32"; and for XP, Vista, and 7 it is "C:\Windows\System32".



Payload

Contacts remote host

DDoS:Win32/Nitol.C may contact a remote host at 222.175.169.73 using port 8086. Commonly, malware may contact a remote host for the following purposes:

  • To report a new infection to its author
  • To receive configuration or other data
  • To download and execute arbitrary files (including updates or additional malware)
  • To receive instruction from a remote attacker
  • To upload data taken from the affected computer


This malware description was produced and published using our automated analysis system's examination of file SHA1 f84c316fe6cc4ae50d37750925102d5570a48938.

Last update 10 October 2012

 

TOP

Malware :