Port No | 455 |
Service Name | Fatcon |
RFC Doc | 0 |
Protocol | TCP |
Description | This backdoor malware, written and compiled in Visual Basic 6.0, compromises network security. It uses a server program to infect a target computer and uses a client program to access and control the infected system. The hacker uses a DLL file, XVOICE.DLL to relay messages to an infected system using audio and voice as a medium and can be heard on the infected computer’s speakers. Once the server component is executed on the infected system, it enables the hacker access to and control over its infected system. |
Reference Link | Fatcon |
Attack | Solutions: Click Start>Run, type Regedit then hit the Enter key. In the left panel, double click the following: HKEY_LOCAL_MACHINE>Software>Microsoft>Windows >CurrentVersion>Run In the right panel, look for and then delete this registry data: WinTray Close the Registry. Restart your computer. Scan your system with Trend Micro antivirus and delete all files detected as BKDR_FATC.A. To do this Trend Micro customers must download the latest pattern file and scan their system. Other email users may use HouseCall |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.