Event ID - 12623

Port No12623
Service NameDUNControl
RFC Doc0
ProtocolTCP
DescriptionDUN Control
Reference LinkMore INformation
AttackName:

ButtMan is a RAT. Once installed, ButtMan server version 0.9n adds the registry key: Whatever the filename is to ensure that it runs whenever the system starts. By default, ButtMan server v09.n listens on Transmission Control Protocol (TCP) port 12624.

Backdoor Buttman 0.9 is a Trojan that opens up a backdoor program that, once installed on a system, permits unauthorized users to remotely authenticate, create gateway connections, edit files/registry, etc. Buttman 0.9 runs its server over ports 12623 via UDP, and 12624 via TCP. The client for controlling the infected machine connects over port 12625 via TCP

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.