Event ID - 28678

Port No28678
Service NameExploiter
RFC Doc0
ProtocolTCP
DescriptionA Trojan is a program that enables an attacker to get nearly complete control over an infected PC. Frequently used by as a tool by malicious hackers. When this program executes, the program performs a specific set of actions. This usually works toward the goal of allowing the trojan to survive on a system and open up a backdoor
Reference LinkMore Information
AttackName:Exploiter

A Trojan horse is a malicious program that is disguised as legitimate software. Trojan horse programs cannot replicate themselves, whereas viruses can do so. A backdoor is a method to gain unauthorized access to a system. It can be a separate program, or code embedded in another program.

Exploiter is a backdoor Trojan affecting Microsoft Windows operating systems. It is written in Delphi and spreads by manual installation. When first executed, Exploiter copies the backdoor server, Windll.exe, to the Windows System directory. It modifies the registry, so that the backdoor server runs whenever Windows starts up. The backdoor server default opens TCP port 21554 on the victim machine.

A remote attacker can use the Exploiter client to gain unauthorized access to the victim system. The attacker can then perform operations such as: upload or download files, execute commands, restart Windows, control the mouse, send messages, get AOL Instant Messenger Passwords, and send e-mail messages.

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.