Port No | 146 |
Service Name | The Infector 1.0 |
RFC Doc | 0 |
Protocol | UDP |
Description | The Infector 1.0 is an upload trojan. Being an upload trojan means this trojan is sent to infect the victim. Once infected, this trojan is used to upload other trojans (such as SubSeven) and infect the victim with these other trojans. The author also suggested using The Infector trojan as a backup, so that if the main trojan was removed from a victim’s computer. The Infector could be used to upload a different trojan to take the place of the removed one |
Reference Link | The Infector 1.0 |
Attack | It Autloads: System.ini: shell=Explorer.exe c:\where ever the trojan is.exe under [boot] Features: Remove server Run file Upload file Fix: Remember the file name after the shell=Explorer.exe under [boot] in the system.ini. Then change the shell=Explorer.exe c:\where the trojan is.exe to shell=Explorer.exe in the system.ini under [boot]. Which can be done with any other text editing program. Reboot the computer or close the trojan file. Delete the trojan file. |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.