Class
Trojan-DDoS
Platform
Win32

Parent class: TrojWare

Trojans are malicious programs that perform actions which are not authorized by the user: they delete, block, modify or copy data, and they disrupt the performance of computers or computer networks. Unlike viruses and worms, the threats that fall into this category are unable to make copies of themselves or self-replicate. Trojans are classified according to the type of action they perform on an infected computer.

Class: Trojan-DDoS

This type of malicious program is designed to conduct a DoS attack from an infected computer on a pre-defined address. Essentially, a DoS attack involves sending numerous requests to the victim machine; this leads to a denial of service if the computer under attack does not have sufficient resources to process all the incoming requests. In order to conduct a successful DoS attack, malicious users often infect a number of computers with this type of Trojan in advance (for example, as part of a mass spam mailing.) As a result, all the infected computers will attack the victim machine.

Read more

Platform: Win32

Win32 is an API on Windows NT-based operating systems (Windows XP, Windows 7, etc.) that supports execution of 32-bit applications. One of the most widespread programming platforms in the world.

Description

Technical Details

This is a Win32 DDoS (Distributed Denial of Service attack) Trojan that was distributed by a hacker (or hackers group) in November 2000. The Trojan was sent as an e-mail message with an attached file.

The message text and header looks as follows:

--------------------------------------------------------
From: World Travel Agency Ltd. [office4@worldtravel.com]
Sent: November 21, 2000 5:31 PM]
To: All tourists and vacationist]
Subject: Celebrate the New Millenium!]

World Travel Agency Ltd.
359 BTC Drive
P.O. Box 134108
Seattle, WA 98108-23
USA

Dear Sir/Madam

Celebrate the New Millenium! Discover the Paradise!

We offer the most attractive package for the New Millenium celebrations you have ever seen.
Pure nature, modern architecture and high technologies are fused to create the perfect resort.
Reasonable prises, correctness, high quality services.
Click on the zip-file below to see our offer!
Make your neighbours envy!

Best Regards,
--------------------------------------------------------

The attached file intends to be displayed as a ZIP archive, but it is a Windows EXE file with the following name:

"OFFER2001.ZIP [many spaces] .EXE"

This is Trojan "installer" that will affect a computer if it is run. Because of a "spaces" trick, it will be displayed as a .ZIP file in many cases, which could deceive a user to open it.

Installation

When the EXE file (Trojan installer) is run, it extracts from itself two more executable files and copies them to the Windows system director with the following names:

MRE.DLL
SOUNDV.EXE

Under Win9x and WinNT, these files are then registered in the auto-run sections in different ways: under WinNT, the Trojan registers a SOUNDV.EXE file in the system registry:

SOFTWAREMicrosoftWindowsCurrentVersionRun soundv.exe

Under Win9x, the DLL file is registered in the SYSTEM.INI file in the following[boot] section:

drivers=mre.dll

The Trojan then displays the following fake error message:

Error
A requred DLL does not exist.

A requred DLL does not exist

(the grammar mistake is left as it is in the Trojan code).

The SOUNDV.EXE is the DoS Trojan itself. The MRE.DLL is a small program that just executes the SOUNDV.EXE upon each running. As a result, under both Win9x and WinNT, the SOUNDV.EXE component will be activated.

DoS Attack

When this file is run (upon the next Windows restart), it will stay active as a hidden application (service), then it enables the auto-dial option in the Internet settings, then performs a DoS attack on the server "kozirog.netissat.net".

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.