Port No | 1208 |
Service Name | BKDR_INFECTOR |
RFC Doc | 0 |
Protocol | TCP |
Description | This backdoor malware is version 20.B of the multi-feature Remote Access Tool (RAT) known as the “Infector.” It allows a remote hacker access to an infected machine. It compromises network security. |
Reference Link | BKDR_INFECTOR |
Attack | Solutions: Once the malicious program has been identified, you need to terminate it from memory. In this procedure, you will need the names of the file or files detected earlier as BKDR_INFECTOR.C. Open the Windows Task Manager. On Windows NT/2000/XP systems, press CTRL+SHIFT+ESC On systems running Windows 9x/ME, use either a third party process viewer to view and terminate the malware process, or restart your system using Trend Micro's Emergency Rescue Disc (ERD). You may also skip this procedure (Terminating the Malware Program), and proceed to the next procedure. Select one of the detected files, and then press either the End Task or the End Process button, depending on the version of your Windows. Note that on Windows NT/2000/XP, the list of running processes is located under the Processes tab. Do the same for all detected malware files in the list of running processes. To verify if the malware process has been terminated, press F5 to refresh Task Manager then review the process list. Close the Task Manager. |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.