TROJ_YODDOS.NSX
Backdoor.Spikeddos (Symantec); Trojan.Win32.Yoddos (Ikarus)
Windows

Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It performs denial of service (DoS) attacks on affected systems using specific flooding method(s).
It deletes itself after execution.
TECHNICAL DETAILS
29,184 bytes
EXE
23 Jul 2015
Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This Trojan drops the following copies of itself into the affected system and executes them:
- %Windows%\WinHelp32.exe
(Note: %Windows% is the Windows folder, where it usually is C:\Windows on all Windows operating system versions.)
Autostart Technique
This Trojan registers itself as a system service to ensure its automatic execution at every system startup by adding the following registry entries:
HKLM\SYSTEM\ControlSet001\
Services\WinHelp32
DisplayName = WinHelp32 Service
HKLM\SYSTEM\ControlSet001\
Services\WinHelp32
ImagePath = %Windows%\WinHelp32.exe
Denial of Service (DoS) Attack
This Trojan performs denial of service (DoS) attacks on affected systems using the following flooding method(s):
- SYN Flood
- GET Flood
- ICMP Flood
- UDP Flood
- DNS Flood
Other Details
This Trojan performs DNS requests to the following sites:
- www.{BLOCKED}x.com
- www.{BLOCKED}i.com
- dns.{BLOCKED}i.com
It deletes itself after execution.