Port No | 6669 |
Service Name | Vampire |
RFC Doc | 0 |
Protocol | TCP |
Description | A Trojan is a program that enables an attacker to get nearly complete control over an infected PC. Frequently used by as a tool by malicious hackers. When this program executes, the program performs a specific set of actions. This usually works toward the goal of allowing the trojan to survive on a system and open up a backdoor. Trojan or Trojan Horse is a general term that refers to programs that appear desirable, but actually contain something potentially harmful. It gets its name from the Trojan Horse that was an instrument of war used by the Greeks to gain access to the city of Troy. It looked like a gift of a giant wooden horse, but actually concealed soldiers inside. |
Reference Link | More INformation |
Attack | Name:Vampire Vampire is an open source ICQ worm programmed in Visual Basic. Vampire spreads by sending itself to other ICQ users with files such as "This Rox.zip .exe". When sent, ICQ only displays This Rox.zip to the person receiving the file. Vampire tries to send itself out every 1-20 minutes (it chooses randomly). When Vampire tries to send itself to another ICQ user it hides the file transfer window. Being open source means anything in it can be changed easily. However, because it is programmed in Visual Basic the chances of wide spread infection are reduced greatly. How To Remove: 1. Remove the SYSMSG key in the registry located at HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices Which can be done with regedit or any other registry editing program. 2. Reboot the computer or close SYSMSG332. 3. Delete the trojan file SYSMSG332 in the windows system directory |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.