Nitol

By ESGI Advisor in Malware

Threat Scorecard

Threat Level: 80 % (High)
Infected Computers: 4,912
First Seen: April 17, 2012
Last Seen: April 12, 2026
OS(es) Affected: Windows

Nitol is a malware infection that is installed in brand-new laptop and desktop computers being sold in China. Nitol is embedded in bogus versions of Microsoft's Windows XP or Windows 7 OS. Nitol is generated to spy on the PC users and perform denial-of-service attacks. Nitol quickly circulates via removable drives and is found on computers in China, Australia, Germany, Russia and the United States. Nitol is controlled through the 3322.org domain which has been connected with malicious activities.

SpyHunter Detects & Remove Nitol

File System Details

Nitol may create the following file(s):
# File Name MD5 Detections
1. lgfxcu.exe a7027359c127c41f595e192d5bc6f93c 29
2. LPK.dll 1005f5b7d887c69dad445ef8bfe2ba6e 17
3. server.EXE fa83218ca7e58eadde29e52cce1981a8 10
4. igdbZWS.exe 355b78b054d18792f0f39345e5dca25d 9
5. xx25.exe 28fa5862ecbc2dce373b579e0f263393 4
6. nb.exe a9c935ff66adf8ae61fbac6eda9dc652 3
7. XLARAp.dll 2dc44a37b451a41562932bac95bad639 1
8. I001.exe 5990ff99244da1b3be2d566456ed9187 1
9. file.exe ddf0134ee920b0b9930f7d7aa2d1e038 0
More files

Registry Details

Nitol may create the following registry entry or registry entries:
Regexp file mask
%APPDATA%\Realtek Audio System Emulator.exe
%WINDIR%\Declient.exe

Directories

Nitol may create the following directory or directories:

%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\Startupÿ

Analysis Report

General information

Family Name: Trojan.Nitol
Signature status: No Signature

Known Samples

MD5: 2f68931c651e4366b7dbd39d0bf7d0f9
SHA1: 9b05c054dff4029a2a7a4b536441431fcc7f0c07
SHA256: A4582973F2E1B84A7634B64783CA8E23D8A8227F9F8E027725656D11B73D7946
File Size: 122.88 KB, 122880 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 64-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Company Name Windows (R) Server 2003 DDK provider
File Description network config sample
File Version 5.2.3790.0 built by: WinDDK
Internal Name snetcfg.exe
Legal Copyright © Microsoft Corporation. All rights reserved.
Original Filename snetcfg.exe
Product Name Windows (R) Server 2003 DDK driver
Product Version 5.2.3790.0

File Traits

  • 2+ executable sections
  • x64

Block Information

Total Blocks: 9
Potentially Malicious Blocks: 1
Whitelisted Blocks: 8
Unknown Blocks: 0

Visual Map

x 0 0 0 2 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtReadRequestData
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
Show More
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWriteFile
  • UNKNOWN

Related Posts

Trending

Most Viewed

Loading...