Characteristics Dorkbot.Bx Malware Infected Computer – Technology.
Characteristics Dorkbot.Bx malware Infected Computer
Malware Dorkbot.Bx – Bismillah, in the Computer Learning postingannya will discuss about the characteristics of computers Infected with malware dorkbot.bx. This one is detected as malware or W32.Dorkbot.BX Trojan.Generic.KD.440 previously spread as a trojan BItCoinMiner a trojan using kolab. Malware is a group that Zbot malware designed to steal information or data of computer users, especially those related to personal data by internet bangking.
Dorkbot.Bx trojan variant is a variant of Zbot malware that appears at the beginning of December 2011 and to spread widely and has the ability to record personal information such as usernames, passwords, credit cards and others.
Here are the characteristics of changes in computers and laptops Infected with malware friend:
- CPU 100% – Appointment of the percentage of CPU performance up to 100%, this is because the activity of the trojan is trying to break cryptographic BitCoin blog and actively try to make the data transmission.
- Boros Bandwidth – The main causes of waste of bandwidth caused by data transmission activity conducted by Dorkbot.Bx.
- Hide folders on USB drives / Removable disk – Hide folders on USB drives / Removable disk and making a false shortcut similar to the folder name.
- Connect to the server BitCoin – Dorkbot.Bx BitCoin connect to the server to perform the data transmission blocks BitCoin cryptography uses the account on BitCoin malware makers.
- Connect to IRC / Remote Server – Connect to an IRC / Remote server for sending information BitCoin computer users.
- Download a malware file – To simplify the process, Dorkbot.Bx also download some malware files, of course, from the IRC / Remote server in order to stay updated antivirus and not easily recognizable.
- Downloading files Certificate Authority (CA) – At the bottom of the Certificate Authority (CA) is used in online payment transactions such as banks, paypal and some other sites that use the SSL protocol.
- Transfer data that has been in getting – The main objective of the trojan is to transfer data have been obtained from the user’s computer or laptop is infected.
- Open various ports – Dorkbot.Bx also open various ports on the computer / laptop to the victim can easily connect to the IRC / Remote server.
- Adopted the facebook chat – this is the method most often found users, Dorkbot.Bx provide link url has been changed into a short, so users will be easily fooled and download the file.
- Changing Registry – In general malware to modify the registry so freely to spread via USB when the device is removable and plugs directly active in the infected computer / laptop buddy.
As my friend itulan characteristics that could mate encounter when computer / laptop is infected with malware my friend on this one. Hopefully this article provides little information about malware that lately has been a lot of infected computers connected to the Internet network and for my friend who likes to pal transactions that often follow the development of malware on this one. So
- characteristics of an infected computer
- laptop infected with dorkbot