Port No | 28678 |
Service Name | Exploiter |
RFC Doc | 0 |
Protocol | TCP |
Description | A Trojan is a program that enables an attacker to get nearly complete control over an infected PC. Frequently used by as a tool by malicious hackers. When this program executes, the program performs a specific set of actions. This usually works toward the goal of allowing the trojan to survive on a system and open up a backdoor |
Reference Link | More Information |
Attack | Name:Exploiter A Trojan horse is a malicious program that is disguised as legitimate software. Trojan horse programs cannot replicate themselves, whereas viruses can do so. A backdoor is a method to gain unauthorized access to a system. It can be a separate program, or code embedded in another program. Exploiter is a backdoor Trojan affecting Microsoft Windows operating systems. It is written in Delphi and spreads by manual installation. When first executed, Exploiter copies the backdoor server, Windll.exe, to the Windows System directory. It modifies the registry, so that the backdoor server runs whenever Windows starts up. The backdoor server default opens TCP port 21554 on the victim machine. A remote attacker can use the Exploiter client to gain unauthorized access to the victim system. The attacker can then perform operations such as: upload or download files, execute commands, restart Windows, control the mouse, send messages, get AOL Instant Messenger Passwords, and send e-mail messages. |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.