Port No | 28678 |
Service Name | Exploiter |
RFC Doc | 0 |
Protocol | TCP |
Description | This memory-resident backdoor program is designed to access and control a target system. It has a client and server component to carry out its malicious capabilities. The server component is installed on the target system while the client is with the remote malicious user. The server attempts to open a port and thereafter wait for client connection. Upon establishing port connection, the client component may perform the following actions, which effectively compromises the target system's security: This malicious programs runs on Windows 9x and ME systems. |
Reference Link | Exploiter Trojan |
Attack | SOLUTION : Identifying the Malware Program Before proceeding to remove this malware, first identify the malware program. Scan your system with Trend Micro antivirus and NOTE all files detected as BKDR_EXPLOIT.A. To do this, Trend Micro customers must download the latest pattern file and scan their system. Other Internet users can use HouseCall, Trend Micro's free online virus scanner. Terminating the Malware Program This procedure terminates the running malware process from memory. You will need the name(s) of the file(s) detected earlier. 1.Open Windows Task Manager. On Windows 9x/ME systems, press CTRL+ALT+DELETE On Windows NT/2000/XP systems, press CTRL+SHIFT+ESC, and click the Processes tab. 2.In the list of running programs*, locate the malware file or files detected earlier. 3.Select one of the detected files, then press either the End Task or the End Process button, depending on the version of Windows on your system. 4.Do the same for all detected malware files in the list of running processes. 5.To check if the malware process has been terminated, close Task Manager, and then open it again. 6.Close Task Manager. Removing Autostart Entries from the Registry Removing autostart entries from the registry prevents the malware from executing during startup. 1.Open Registry Editor. To do this, click Start>Run, type REGEDIT, then press Enter. 2.In the left panel, double-click the following: HKEY_LOCAL_MACHINE>Software>Microsoft> Windows>CurrentVersion>Run 3.In the right panel, locate and delete the entry: Server.exe 4.Close Registry Editor. NOTE : If you were not able to terminate the malware process from memory as described in the previous procedure, restart your system. |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.