Port No | 34313 |
Service Name | Delf |
RFC Doc | 0 |
Protocol | TCP |
Description | This memory-resident backdoor compromises network security by acting as an FTP server on the target system. It enables a malicious user to do the following to a target system: create a Telnet session,updload / download / delete files ,list files in current directory ,modify FTP username and password ,modify FTP port ,This is written in Delphi and runs on Windows 95, 98, ME, NT, 2000, and XP. |
Reference Link | Delf Trojan |
Attack | SOLUTION : Identifying the Malware Program Before proceeding to remove this malware, first identify the malware program. Scan your system with Trend Micro antivirus and NOTE all files detected as BKDR_DELF.CV. To do this, Trend Micro customers must download the latest pattern file and scan their system. Other Internet users can use HouseCall, Trend Micro's free online virus scanner. Terminating the Malware Program This procedure terminates the running malware process from memory. You will need the name(s) of the file(s) detected earlier. 1.Open Windows Task Manager. On Windows 95/98/ME systems, press CTRL+ALT+DELETEOn Windows NT/2000/XP systems, press CTRL+SHIFT+ESC, then click the Processes tab. 2.In the list of running programs*, locate the malware file or files detected earlier. 3.Select one of the detected files, then press either the End Task or the End Process button, depending on the version of Windows on your system. 4.Do the same for all detected malware files in the list of running processes. 5.To check if the malware process has been terminated, close Task Manager, and then open it again. 6.Close Task Manager. NOTE : On systems running Windows 95/98/ME, Task Manager may not show certain processes. You may use a third party process viewer to terminate the malware process. Otherwise, continue with the next procedure, noting additional instructions |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.