Home / malwarePDF  

DDoS:Win32/Zanich.D


First posted on 30 January 2015.
Source: Microsoft

Aliases :

There are no other names known for DDoS:Win32/Zanich.D.

Explanation :

Threat behavior

Installation
This threat copies itself to:

  • %SystemRoot%\declient.exe


It modifies the registry so that it runs each time you start your PC. For example:

In subkey: HKLM\software\microsoft\windows\currentversion\run
Sets value: "ReflWorkAssist"
With data: "%SystemRoot%\declient.exe"



Payload

Uses your PC in a DDoS attack

This threat can use your PC for Distributed Denial of Service attacks.

During an attack your Internet connection could run slower than usual.



Connects to a remote host

We have seen this threat connect to a remote host, including:
  • q1995.kmdns.net using port 29132
Malware can connect to a remote host to do any of the following:
  • Check for an Internet connection
  • Download and run files (including updates or other malware)
  • Report a new infection to its author
  • Receive configuration or other data
  • Receive instructions from a malicious hacker
  • Search for your PC location
  • Upload information taken from your PC
  • Validate a digital certificate
This malware description was published using automated analysis of file SHA1 1cbe5ae1316b1702957e5468d6b1f1879d721f01.Symptoms

The following can indicate that you have this threat on your PC:

  • You see these files:
    • %SystemRoot%\declient.exe
  • You see registry modifications such as:
    • In subkey: HKLM\software\microsoft\windows\currentversion\run
      Sets value: "ReflWorkAssist"
      With data: "%SystemRoot%\declient.exe"

Last update 30 January 2015

 

TOP