本帖最后由 ELOHIM 于 2015-8-17 22:41 编辑
DDoS:Win32/Nitol
类别: 特洛伊木马拒绝服务
描述: 这个程序可以用于执行拒绝服务攻击。
推荐的操作: 立即删除这个软件。
项目:
file:C:\ProgramData\Microsoft\Windows Defender\LocalCopy\{E3A598A0-1320-4833-92E8-B0872FFFDEE1}-lpk.rar
联机获取此项的详细信息。
-----------------------------
Threat behavior InstallationVariants of DDoS:Win32/Nitol can create copies of themselves as an EXE or DLL file, with a randomly generated file name of six characters, for example, "faxjwe.exe". The trojan creates the copy in one of the following folders: For example: - %ProgramFiles%\viffic.exe
- <system folder>\hyjzuk.exe
- <system folder>\riffic.exe
- %windir%\4_Ss.dll
Some variants can install a service as a legacy driver with the following registry modification: In subkey: "HKLM\System\CurrentControlSet\Enum\Root\LEGACY_<SERVICE>\0000"
Sets value: "Class"
With data: "LegacyDriver" Sets value: "Legacy"
With data: "0x00000001" where <SERVICE> is the service name installed by the malware. The service's name is usually created from a hardcoded string (such as "111111111", "MSUpdqte" or "Nationald") with random characters inserted in or added to the string, as in the following examples: - fuwu111111111
- MSUpdqtezni
- Nationaljrqd
The service's display name is also created from hardcoded strings with random characters insterted in or added to the string, as in the following examples: - "<random characters>222222222", for example "fuwu222222222"
- "Microsoft Windows Uqdate<random characters> Service", for example "Microsoft Windows Uqdatexla Service"
- "National<random characters> Instruments dDomain Service", for example "Nationalyta Instruments dDomain Service"
Other variants use a completely random name for the service, for example: - na5eon2saul
- oejuvpvabo
- phqghumeay
Some variants of DDoS:Win32/Nitol will instead pass the trojan as a DLL through the ServiceDll parameter, by modifying the following registry entry: In subkey: HKLM\System\CurrentControlSet\Services\<service name>\Parameters
Sets value: "ServiceDll"
With data: "<malware file>.dll" for example: In subkey: HKLM\System\CurrentControlSet\Services\6to4\Parameters
Sets value: "ServiceDll"
With data: "%windir%\4_Ss.dll" Some variants may delete themselves from their initial location. Earlier variants use the command line " cmd.exe /c del <malware file> > nul", while later variants may rename themselves as " %TEMP%\SOFTWARE.LOG" and set themselves to be deleted when you restart your PC. PayloadAllows backdoor access and control All variants of DDoS:Win32/Nitol allow unauthorized access and control of your PC by connecting to a remote server every 300 milliseconds to wait for commands. Using this backdoor, a malicious hacker can perform the following actions: - Download and run files
- Restart your PC
- Shut down your PC
- Start Internet Explorer
- Uninstall the trojan (by releasing the mutex, deleting the service, and setting the installed file attributes to normal)
- Update the trojan
- Perform DDoS attacks
Some variants can download the update file to the %TEMP% folder in the format of "<five random characters>.exe, for example "axyjg.exe". Other variants use the following formats: - "stf<five random characters>.exe", for example "stfaxyjig.exe"
- "bpk<five random characters>cn.exe", for example "bpkjxvacn.exe"
Connects to remote server All variants of DDoS:Win32/Nitol connect to a remote server to upload information about your PC, including: - The version of the trojan installed on your PC
- Your PC's geographic location
- Your PC's name
- Your PC's processing (CPU) speed
- The amount of installed memory (RAM) on your PC
- Your operating system type and version
The trojan connects to the remote server using a TCP or UDP connection. We have seen variants connecting to the following remote servers using a TCP connection: - 120272.3322.org:7000
- cbr.gnway.net:1484
- closewait.wowip.kr:12
- dnf43.3322.org:9001
- fei9988.3322.org:8080
- fghziyi.chibizx.com:8889
- hkl144.3322.org:7044
- huyiai.3322.org:7000
- mild443164.3322.org:7777
- rq00605.cn:8080
- w424010817.3322.org:8000
- woainimqq.3322.org:7000
- ylm466.3322.org:7000
- ysok.3322.org:7000
Injects code Some variants of DDoS:Win32/Nitol inject code into svchost.exe so as to communicate with the remote server. These variants also use code injection to hinder detection and removal. Drops component files Some of the later variants (such as DDoS:Win32/Nitol.B) are distributed as an executable package (EXE) that contains a DLL component file. When run, these variants drop the DLL component as " lpk.dll" (with the "HIDDEN", "SYSTEM" and "READONLY" file attributes set) into all folders on all local and removable drives on your computer that contain files with an .exe, .rar or .zip extension. These DLL files are appended with a copy of the EXE, and are are modified to load the EXE copy when they are run. In Windows, "lpk.dll" is always loaded when support for East Asian languages is installed. Once loaded, the LpkInitialize export will be called, which in this case will run the code to load the malware. Another copy of "lpk.dll" may also be created in the <system folder> as "gei<random number>.dll", for example "gei33.dll". Additional informationEach variant of the trojan creates a mutex as an infection marker to prevent multiple instances running on your computer. The mutex name is identical to the service name created by the malware, such as in the following examples: - fuwu111111111
- MSUpdqtezni
- na5eon2saul
- Nationaljrqd
Related encyclopedia entriesAnalysis by Patrik Vicol
SymptomsSystem changes The following system changes may indicate the presence of this malware: - The presence of the following files:
<system folder>\<six characters>.exe
<system folder>\<six characters>.dll
<system folder>\gei<random number>.dll
%ProgramFiles%\<six characters>.exe
%ProgramFiles%\<six characters>.dll
%TEMP%\SOFTWARE.LOG
%TEMP%\stf<five characters>.exe
%windir%\<six characters>.exe
%windir%\<six characters>.dll
- The presence of the file "lpk.dll" in all folders on your PC that contain files with an .exe, .rar or .zip extension
- The presence of services with random characters in their name, for example:
Nationalyta Instruments dDomain Service"
Microsoft Windows Uqdatexla Service
phqghumeay
na5eon2saul
oejuvpvabo
Prevention
Alert level: Severe First detected by definition: 1.151.33.0
Latest detected by definition: 1.203.984.0 and higher
First detected on: May 15, 2013
This entry was first published on: Sep 26, 2012
This entry was updated on: Nov 17, 2014 This threat is also detected as:
|