Event ID - 2281

Port No2281
Service NameNAUTICAL
RFC Doc0
ProtocolTCP
DescriptionThis Win32 worm spreads through a network by creating a folder, into which it drops a copy of itself using an interesting filename. It then shares this folder with full access, tempting unsuspecting users on the same network to obtain, and even execute, its malicious copy.

This worm has backdoor capabilities, allowing remote users to access the machine it has installed on. It has a client component that remotely connects to its server counterpart on the compromised machine.
Reference LinkNAUTICAL
AttackSolution:
This procedure terminates the running malware process from memory.
Open Windows Task Manager.
On Windows 9x/ME systems, press
CTRL+ALT+DELETE
On Windows NT/2000/XP systems, press
CTRL+SHIFT+ESC, and click the Processes tab.
In the list of running programs*, locate the malware file or files detected earlier as BKDR_NAUTIC.A.
Select the malware process, then press either the End Task or the End Process button, depending on the version of Windows on your system.
To check if the malware process has been terminated, close Task Manager, and then open it again.
Close Task Manager.

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.