Class
DoS
Platform
LockAkk

Parent class: Malware

Malicious tools are malicious programs designed to automatically create viruses, worms, or Trojans, conduct DoS attacks on remote servers, hack other computers, etc. Unlike viruses, worms, and Trojans, malware in this subclass does not present a direct threat to the computer it runs on, and the program’s malicious payload is only delivered on the direct order of the user.

Read more

Class: DoS

DoS programs are designed to conduct DoS (Denial of Service) attacks on a victim computer. Essentially, these attacks send numerous requests to a remote computer, and if the computer does not have enough resources to process all the incoming requests, the result will be a denial of service.

Read more

Platform: LockAkk

No platform description

Description

Removal instructions

If your computer does not have an up-to-date antivirus, or does not have an antivirus solution at all, follow the instructions below to delete the malicious program:

  1. Delete the original malicious program file (the location will depend on how the program originally penetrated the victim machine).
  2. Update your antivirus databases and perform a full scan of the computer (download a trial version of Kaspersky Anti-Virus).

Technical Details

This malicious program is designed to conduct Denial of Service attacks on a remote server. It is a Linux ELF file. It is 15 048 bytes in size. It is written in C++.

Payload

The program exploits a buffer overflow vulnerability when incoming data is processed by Microsoft IIS HTTP server in order to conduct a DoS attack on the remote machine. The address of the computer and the server's working directory are designated by the remote malicious user as a inbound parameter when launching the malicious program.

This malicious program may cause the server under attack to suffer reduced performance in supporting network connections.

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.