--------------------------------------------------------------------------------
惡意程式類別: Others
別名: DDoS.Trojan
广泛传播: 不
破坏性的: 不
语言: English
平台: Windows 95, 98, ME, NT, 2000, XP
加密的: 不
整体风险程度: 低度
--------------------------------------------------------------------------------
描述: This flooder malware performs a SYN flood attack on the remote site 202.101.43.44, which as of this writing is currently unavailable. It launches a distributed denial of service attack on the said site by continuously sending data packets to the remote site. This can cause the system to slow down or even hang. This malware is written in Borland Delphi and arrives as a TeLock-compressed file. It runs on Windows 95, 98, ME, NT, 2000 and XP. --- 解決方案: Identifying the Malware Program Before proceeding to remove this malware, first identify the malware program. Scan your system with Trend Micro antivirus and NOTE all files detected as DDOS_RESOD.A. To do this, Trend Micro customers must download the latest pattern file and scan their system. Other Internet users can use HouseCall, Trend Micro's free online virus scanner. Terminating the Malware Program This procedure terminates the running malware process from memory. You will need the name(s) of the file(s) detected earlier. Open Windows Task Manager. On Windows 95/98/ME systems, press CTRL+ALT+DELETE On Windows NT/2000/XP systems, press CTRL+SHIFT+ESC, then click the Processes tab. In the list of running programs*, locate the malware file or files detected earlier. Select one of the detected files, then press either the End Task or the End Process button, depending on the version of Windows on your system. Do the same for all detected malware files in the list of running processes. To check if the malware process has been terminated, close Task Manager, and then open it again. Close Task Manager. *NOTE: On systems running Windows 95/98/ME, Task Manager may not show certain processes. You may use a third party process viewer to terminate the malware process. Otherwise, continue with the next procedure, noting additional instructions. Removing Autostart Entries from the Registry Removing autostart entries from registry prevents the malware from executing during startup. You will need the name(s) of the file(s) detected earlier. Open Registry Editor. To do this, click Start>Run, type REGEDIT, then press Enter. In the left panel, double-click the following: HKEY_LOCAL_MACHINE>Software>Microsoft> Windows>CurrentVersion>Run In the right panel, locate and delete the entry or entries whose data value (in the rightmost column) is the malware file(s) detected earlier. Close Registry Editor. NOTE: If you were not able to terminate the malware process from memory as described in the previous procedure, restart your system. Additional Windows ME/XP Cleaning Instructions Running Trend Micro Antivirus Scan your system with Trend Micro antivirus and delete all files detected as DDOS_RESOD.A. To do this, Trend Micro customers must download the latest pattern file and scan their system. Other Internet users can use HouseCall, Trend Micro’s free online virus scanner.
|