Parent class: Malware
Malicious tools are malicious programs designed to automatically create viruses, worms, or Trojans, conduct DoS attacks on remote servers, hack other computers, etc. Unlike viruses, worms, and Trojans, malware in this subclass does not present a direct threat to the computer it runs on, and the program’s malicious payload is only delivered on the direct order of the user.Read more
Class: DoS
DoS programs are designed to conduct DoS (Denial of Service) attacks on a victim computer. Essentially, these attacks send numerous requests to a remote computer, and if the computer does not have enough resources to process all the incoming requests, the result will be a denial of service.Read more
Platform: Perl
No platform descriptionDescription
Technical Details
This malicious program is designed to conduct Denial of Service attacks on a remote server. The program itself is a malicious script written in Perl. It is 7747 bytes in size.
Payload
The program exploits a buffer overflow vulnerability in processing incoming data in order to conduct a DoS attack on the remote machine.
Its functionality makes it possible to attack the following servers:
- Avirt Mail Server v3.5
- BFTelnet Server v1.1
- BisonWare FTP Server v3.5
- Broker FTP Server v3.5
- Cmail SMTP Server v2.4
- ExpressFS FTP server v2.x
- G6 FTP Server v2.0 beta4/5
- MDaemon httpd Server v2.8.5.0
- PakMail SMTP/POP3 v1.25
- Vermillion FTP Server v1.23
- WFTPD FTP Server 2.40
- XtraMail POP3 Server v1.11
- ZetaMail POP3 Server v2.1
The remote malicious user is required to provide the address, type of server to be attacked and authorization parameters on program launch.
The malicious script may cause the server under attack to suffer reduced performance in supporting network connections.
Removal instructions
If your computer does not have an up-to-date antivirus, or does not have an antivirus solution at all, follow the instructions below to delete the malicious program:
- Delete the original malicious program file (the location will depend on how the program originally penetrated the victim machine).
- Update your antivirus databases and perform a full scan of the computer (download a trial version of Kaspersky Anti-Virus).
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com