Event ID - 1602

Port No1602
Service NameBackDoorDirectConnection
RFC Doc0
ProtocolTCP
DescriptionThe backdoor malware has a server component, a client component and a server configuration component. It uses the server program to infect the target computer, uses the client program to access and control the target system, and uses the configuration component to configure the server program.

By default the client program connects to the server program at a port 1600, but this port may be configured with the server configuration program. This backdoor malware compromises network security because it allows hackers to control the target computer
Reference LinkBackDoorDirectConnection
AttackSolutions:

Close the server configuration program by pressing the X button on its main Window.
Scan your system with Trend Micro antivirus and delete all files detected as BKDR_DCONNECT.A. To do this Trend Micro customers must download the latest pattern file and scan their system. Other email users may use HouseCall, Trend Micro's free online virus scanner. Details:

The hacker witht he client program may execute any or all but not limited to the following on the system with the server program:
Delete/Execute/Create/Copy files
Open/Close the CD-ROM tray.
Chat with the infected computer
Send an email using the infected user as the sender
Stop the server program

This backdoor malware has been written by Snapman.

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.