Port No | 24289 |
Service Name | LATINUS |
RFC Doc | 0 |
Protocol | UDP |
Description | This backdoor program compromises system security by enabling remote users to access and control the affected system. Once installed, it waits for commands from the remote user, which it processes locally on the affected machine. It enables an attacker to do the following: Hide/display desktop icons Hide/display the start button Hide/display taskbar icons Hide/display the taskbar clock Turn on/off the monitor Enable/disable the hot key Alt+Ctrl+Del Open/close the CD-ROM door Enable/disable the Scroll Lock, NumLock, CapsLock Erase or change the contents of the clipboard Enable/disable the clipboard Modify the system date and time Lock/unlock the mouse and keyboard Change the mouse settings Change the display settings Minimize/maximize or change the title of a window Enable/disable and hide/display a window Change the wallpaper Change the computer name Open a Web browser Execute/delete files This malware also has keylogging functionalities. It stores all captured keystrokes to the log file KEYS.TXT in the Windows directory. |
Reference Link | LATINUS |
Attack | Solution This procedure terminates the running malware process from memory. You will need the name(s) of the file(s) detected earlier. Open Windows Task Manager. On Windows 95/98/ME systems, press CTRL+ALT+DELETE On Windows NT/2000/XP systems, press CTRL+SHIFT+ESC, then click the Processes tab. In the list of running programs*, locate the malware file or files detected earlier. Select one of the detected files, then press either the End Task or the End Process button, depending on the version of Windows on your system. Do the same for all detected malware files in the list of running processes. To check if the malware process has been terminated, close Task Manager, and then open it again. Close Task Manager. |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.