Port No | 1561 |
Service Name | Backdoor.Muska |
RFC Doc | 0 |
Protocol | TCP |
Description | This backdoor malware enables remote users to access compromised machines. It works on the Client-Server principle.
Its server component installs on the target machine, where it listens to a port and waits for a connection from its client counterpart. When a connection is established, the client can send remote commands to the server, which executes these commands on the compromised machine. |
Reference Link | Backdoor.Muska |
Attack | Solutions: Removing autostart entries from the registry prevents the malware from executing during startup. Open Registry Editor. To do this, click Start>Run, type REGEDIT, then press Enter. In the left panel, double-click the following: HKEY_LOCAL_MACHINE>Software>Microsoft> Windows>CurrentVersion>RunServices In the right panel, locate and delete the entry: Program Manager Close Registry Editor. If you have a third-party process viewer, terminate the process, CRACK.EXE. Otherwise, restart your computer. |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.