Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:DDOS/Nitol.A.215
Date discovered:28/11/2012
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low
VDF version:7.11.51.190 - Wednesday, November 28, 2012
IVDF version:7.11.51.190 - Wednesday, November 28, 2012

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Symantec: Backdoor.Trojan
   •  Mcafee: Trojan-FCKC!162F79FE4179
   •  Kaspersky: Trojan.Win32.MicroFake.ba
   •  TrendMicro: WORM_MICROFAKE.A
   •  F-Secure: Trojan:W32/MicroFake.A
   •  Sophos: Mal/Nitol-C
   •  Bitdefender: Trojan.Microfake.D
   •  Avast: Win32:Malware-gen
   •  Microsoft: DDoS:Win32/Nitol.A
   •  AVG: Generic21.ANLJ
   •  Panda: Trj/Downloader.SKT
   •  PCTools: Backdoor.Trojan!rem
   •  Eset: Win32/Agent.RNS
   •  GData: Trojan.Microfake.D
   •  AhnLab: Trojan/Win32.Scar
   •  DrWeb: DDoS.Rincux.316
   •  Fortinet: W32/Dropper.RNS!tr
   •  Ikarus: Trojan.Win32.MicroFake
   •  Norman: Nitol.A
   •  Rising: Trojan.Spy.Win32.Hijclpk.b


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7


Side effects:
   • Third party control
   • Can be used to execute malicious code
   • Can be used by rogue users or malware to lower security settings

 Files It copies itself to the following locations:
   • %SYSDIR%\hra33.dll
   • %ALLUSERSPROFILE%\Application Data\AdobeSetup{AC76BA86-7AD7-1031-7B44-AA0000000001}\lpk.dll
   • %HOME%\Local Settings\Temp\7zS161.tmp\lpk.dll
   • %ALLUSERSPROFILE%\{90140000-0011-0000-0000-0000000FF1CE}-C\lpk.dll
   • C:\NTRECYCLERS-1-5-18\lpk.dll
   • C:\NTRECYCLERS-1-5-21-602162358-2077806209-839522115-1003\lpk.dll
   • ..
   • ..



The following file is created:

%SYSDIR%\ylnqq.exe Furthermore it gets executed after it was fully created. Further investigation pointed out that this file is malware, too. Detected as: TR/MicroFake.BA.2

%TEMPDIR%\hrl172.tmp Furthermore it gets executed after it was fully created. Further investigation pointed out that this file is malware, too. Detected as: TR/MicroFake.BA.2

 Backdoor Contact server:
The following:
   • http://wqjkz**********222.org


Description inserted by Elias Lan on Sunday, October 6, 2013
Description updated by Elias Lan on Sunday, October 6, 2013

Back . . . .