Threat Database Trojans DDoS:Win32/Nitol.A

DDoS:Win32/Nitol.A

By CagedTech in Trojans

Threat Scorecard

Threat Level: 80 % (High)
Infected Computers: 85
First Seen: December 3, 2012
Last Seen: April 28, 2026
OS(es) Affected: Windows

Aliases

15 security vendors flagged this file as malicious.

Antivirus Vendor Detection
Kaspersky Trojan.Win32.MicroFake.bg
McAfee Artemis!B6BC38421829
Kaspersky Trojan.Win32.Scar.couf
McAfee Artemis!8B1CA62A7C21
Kaspersky Trojan.Win32.MicroFake.bk
eSafe Win32.TRMicroFake.Ba
McAfee Artemis!4785D37E3598
Panda Trj/Genetic.gen
Antiy-AVL Trojan/Win32.MicroFake
McAfee-GW-Edition Heuristic.BehavesLike.Win32.Suspicious.H
Kaspersky Trojan.Win32.MicroFake.rf
McAfee Artemis!A0EAD738BE12
Ikarus Trojan.Win32.Nitol
AntiVir TR/Agent.bbe
Kaspersky Trojan.Win32.Scar.cyyn

SpyHunter Detects & Remove DDoS:Win32/Nitol.A

File System Details

DDoS:Win32/Nitol.A may create the following file(s):
# File Name MD5 Detections
1. HostServices6.exe b1ebc889d5aebdaa2c687d964ba78d42 18
2. USB3Sw32.dll b6897de2a7ebe57c28d0b527fc85b281 11
3. ScreenShot.exe 51a596330e578d23beb92d2ff24265fa 4
4. ookyou.exe 0e30383773e4b958a0f691c7182fe8f8 1

Analysis Report

General information

Family Name: Trojan.Nitol.AB
Signature status: No Signature

Known Samples

MD5: 60bcb0e1b9ae5a9b50dcff7decd656ae
SHA1: 69c10e2beb55ff3b4ddaeedb40167ac23a87a154
SHA256: A5E39316D1B2E8DBCC12684A1BD8D8B9FB6EDF2F2AB75A5EDDCAF2AB1C609A0A
File Size: 17.41 KB, 17408 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have resources
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Traits

  • No Version Info
  • VirtualQueryEx
  • WriteProcessMemory
  • x86

Block Information

Total Blocks: 47
Potentially Malicious Blocks: 32
Whitelisted Blocks: 8
Unknown Blocks: 7

Visual Map

x 0 ? ? ? ? x x x x x x x x x x x x x x x x x x ? x ? x x x x ? 0 x x 0 0 x x x x x x 1 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\windows\syswow64\winhvqf32.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\windows\syswow64\winhvqf32.exe Generic Write,Read Attributes,Delete,LEFT 262144
c:\windows\syswow64\winhvqf32.exe Generic Write,Read Attributes,LEFT 262144
c:\windows\syswow64\winhvqf32.exe Generic Write,Read Data,Read Attributes,Delete,LEFT 262144
c:\windows\syswow64\winhvqf32.exe Generic Write,Read Data,Read Attributes,LEFT 262144
c:\windows\syswow64\winhvqf32.exe Synchronize,Write Attributes

Registry Modifications

Key::Value Data API Name
HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 RegNtPreCreateKey

Windows API Usage

Category API
Anti Debug
  • OutputDebugString
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess

Shell Command Execution

C:\WINDOWS\system32\cmd.exe /c del c:\users\user\DOWNLO~1\69C10E~1 > nul
C:\WINDOWS\system32\cmd.exe /c del C:\WINDOWS\SysWOW64\WINHVQ~1.EXE > nul

Trending

Most Viewed

Loading...