Event ID - 3024

Port No3024
Service NameWincrash
RFC Doc0
ProtocolTCP
DescriptionWhen installed on a Microsoft Windows system, this backdoor Trojan horse program lets others gain full access to the system through a network connection. Backdoor.Wincrash is divided into 2 parts: a client and a server. Both applications are capable of running under Windows 95, 98, and NT 4.0. The client application running on one computer might be used to monitor and control a second computer running the server application.
The port number through which the client controls the server is configurable. However, as long as the port is blocked by a firewall, this Trojan horse cannot infiltrate the server. It does not matter whether the TCP or UDP protocol is implemented. There have not been any reports of this program breaking through a firewall
Reference LinkMore Information
AttackName:Wincrash

Backdoor.Wincrash is a Trojan Horse program that is divided into 2 parts: a client and a server. The client is used to connect to the server by the Internet or a LAN with TCP/IP.
The server might be configured with several different options. The networking protocol could be TCP or UDP. Any port number between 1 and 65535 could be selected for communication.
To connect to the server (server.exe), it must be running in the computer to which you want to connect. The IP (Internet Protocol) address of the target computer is also needed. The server masked itself as install.exe when sent to a target. Once the file is executed, it self-installs and is initialized every time Windows starts up. The server is invisible to the task list (Ctrl+Alt+Del).

How To Remove:
1. End running tasks:
backdoor-m.svr.exe
client.exe
w32win,1.exe
wincrash.exe
wincrash-e.exe
wpc - wincrash password cracker.exe

2. Remove files (how to?):
_setup.1 _setup.lib
backdoor-m.svr.exe
client.exe
setup.pkg
w32win,1.exe
wincrash.exe
wincrash.rtf
wincrash.tb
wincrash_english.rtf
wincrash2.hlp
wincrash-e.exe
wpc - wincrash password cracker.exe

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.