Port No | 25686 |
Service Name | Backdoor.MoonPie |
RFC Doc | 0 |
Protocol | TCP |
Description | This server component of a memory-resident backdoor malware steals cached passwords and establishes an FTP server where remote users log in and gain access to an infected computer. This program is coded and compiled in Borland Delphi. Its circulating program is compressed with UPX. |
Reference Link | Backdoor.MoonPie |
Attack | Solution: Reboot your system. Before Windows loads, press F8 to enter the Windows Startup Menu and then choose the Safe mode. Run REGEDIT.EXE In the left panel click the plus sign (+) to the left of the following: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows CurrentVersion\Run In the right panel, look for and delete the following: “Regedit” Exit the registry and restart your system. Scan your system with Trend antivirus and delete all files detected as BKDR_MOONPIE.A. To do this Trend Micro customers must download the latest pattern file and scan their system. Other email users may use HouseCall, Trend Micro's free online virus scanner. |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.