Event ID - 6671

Port No6671
Service NameDeep Throat
RFC Doc0
ProtocolTCP
DescriptionWorks on Windows 95, 98 and NT. ˆ Source code is available. There is a Global Master Password backdoor in all the servers: v2.1 - whothefuckdoyouthinkiamgoddamnit1 v3.* - whothefuckdoyouthinkiamgoddamnit3
Reference LinkDeep Throat
Attack

Registers:
HLM\Software\Microsoft\Windows\CurrentVersion\Run\ (version 2.0 does not register)

Files:
Dtv1.zip - 518,427 bytes Dtv2.zip - 713,805 bytes V2client.zip - 410,145 bytes Dtv2.1.zip - 299,996 bytes V3server.zip - 259,875 bytes V3client.zip - 519,032 bytes V31server.zip - 277,217 bytes V31client.zip - 707,056 bytes V31liteclient.zip - 594,953 bytes Remotecontrol.exe - 271,959 bytes Remotecontrol.exe - 414,644 bytes Remotecontrol.exe - 414,657 bytes Remotecontrol.exe - 505,344 bytes Server.exe - 533,013 bytes Dtv3 client.exe - 483,840 bytes Dtv3.1 client.exe - 622,800 bytes Client.sys - 26,112 bytes Confstub.sys - 26,112 bytes Confstub.dll - 26,112 bytes Confstub2.dll - 27,648 bytes Binder.dll - 26,112 bytes Systempatch.exe - 266,752 bytes Systempatch.exe - 269,971 bytes Systempatch.exe - 284,160 bytes Systempatch.exe - 307,398 bytes Systempatch.exe - 312,180 bytes Systempatch.exe - 491,000 bytes System32.exe - Systray.exe - Deep throat mib.exe - 310,690 bytes Systemio.exe -

Actions:
Remote Access / FTP server / Steals passwords

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.