Characteristic PC Infected with Malware Dorkbot.Bx


1. CPU 100%
Just like its forerunner (BitCoinMiner), DorkBot.Bx will also make the CPU becomes gradual. Shows the percentage of CPU utilization 100%. This is because the action of malware that try to break the cryptographic block BitCoin and actively trying to make sending details.

2. Bad of bandwidth
With frequent use of cryptographic action of your pc system resources, will certainly make use of the CPU is slow (100%). But behind it is to note the activities of the Internet bandwith utilization, as a result of trojan viruses DorkBot.Bx creates your bandwith to be elegant.

3. Covering a directory on a USB generate or detachable disk
Just like BitCoinMiner trojan viruses, trojan viruses DorkBot.Bx was also doing the same thing is to hide the files on the USB or detachable generate and make a quick way similar incorrect name of the directory. It seems the trend quick way also motivate trojan viruses DorkBot.Bx

4. Connecting to Hosting server BitCoin
Trojan DorkBot.Bx try to go to Hosting server BitCoin to execute cryptographic distribution BitCoin prevents spyware experts use the account on BitCoin. In this way, the spyware experts gained from being able to quickly execute cryptographic prevents BitCoin through the help of computer systems already contaminated.

5. Be connected to IRC / Distant Server
Trojan DorkBot.Bx also try to go to IRC / Distant Hosting server for the distribution of people BitCoin details required by the spyware experts.

6. Installing details files malware

In obtain to shorten the action, malware DorkBot.Bx also to obtain some specific spyware details files from IRC / Distant Hosting server if you want to stay modified and are not quickly familiar by the computer virus. Files of different spyware is what sometimes creates it difficult to identify the presence of computer virus trojan viruses DorkBot.Bx.

7. Installing details files Document Specialist (CA)
Basically, the Document Specialist (CA) is used in online payment purchases such as banks, PayPal, and thousands of other sites that use the SSL protocol. By downloading the details file CA, spyware makers want to ensure that sufferers of contaminated computer systems already have modified so that CAs can work safely BitCoin.

8. Transfer details have been obtained
The main objective of the trojan viruses DorkBot.Bx is getting details from the visitor's pc system that is contaminated.

9. Open various ports
DorkBot.Bx Trojan also starts various slots on the individuals pc system to be able to quickly go to the IRC / Distant Hosting server, and execute various actions with privacy.

10. Using Facebook Chat
This method is probably the most common customers. DorkBot.Bx provide a URL hyperlink that has been converted into a short, so customers will be quickly misled. If the hyperlink is started out, then the person will obtain a details file using the details file name and symbol are quite 'sexy'.

Another feature is to modify the registry and make some details files to invade computer systems. To be able to directly effective when the person joins the USB or detachable pushes, malware DorkBot.Bx make use of security holes of Windows is Windows Icon owner that creates the quick way from the trojan viruses details file will be effective once to access the generate.

Artikel Terkait


Category Article ,

What's on Your Mind...