Home / malware DDoS:Win32/Zanich.D
First posted on 30 January 2015.
Source: MicrosoftAliases :
There are no other names known for DDoS:Win32/Zanich.D.
Explanation :
Threat behavior
Installation
This threat copies itself to:
- %SystemRoot%\declient.exe
It modifies the registry so that it runs each time you start your PC. For example:
In subkey: HKLM\software\microsoft\windows\currentversion\run
Sets value: "ReflWorkAssist"
With data: "%SystemRoot%\declient.exe"
Payload
Uses your PC in a DDoS attack
This threat can use your PC for Distributed Denial of Service attacks.
During an attack your Internet connection could run slower than usual.
Connects to a remote host
We have seen this threat connect to a remote host, including:Malware can connect to a remote host to do any of the following:
- q1995.kmdns.net using port 29132
This malware description was published using automated analysis of file SHA1 1cbe5ae1316b1702957e5468d6b1f1879d721f01.Symptoms
- Check for an Internet connection
- Download and run files (including updates or other malware)
- Report a new infection to its author
- Receive configuration or other data
- Receive instructions from a malicious hacker
- Search for your PC location
- Upload information taken from your PC
- Validate a digital certificate
The following can indicate that you have this threat on your PC:
- You see these files:
- %SystemRoot%\declient.exe
- You see registry modifications such as:
- In subkey: HKLM\software\microsoft\windows\currentversion\run
Sets value: "ReflWorkAssist"
With data: "%SystemRoot%\declient.exe"
Last update 30 January 2015