Lupin Trojan


· Overview ·
· Origins ·
· Operation ·
· Detection and Removal ·
· Research ·



Overview

Summary:

Bind a shell to a socket... defaults to port 31337.

Category:

Trojan: Any program with a hidden intent. Trojans are one of the leading causes of breaking into machines. If you pull down a program from a chat room, new group, or even from unsolicited e-mail, then the program is likely trojaned with some subversive purpose. The word Trojan can be used as a verb: To trojan a program is to add subversive functionality to an existing program. For example, a trojaned login program might be programmed to accept a certain password for any user's account that the hacker can use to log back into the system at any time. Rootkits often contain a suite of such trojaned programs.

Similar Pests:

Trojan

Origins

Author:

Lupin Hacker,

By This Author:

HP-UX /usr/etc/vhe/vhe_u_mnt bug exploit · Internet port scanner · Pscan2.c TCP/UDP/NIS/RPC scanner · Socdmini

Date of Origin:

August, 1999

Operation

Storage Required:

  • Lupin Trojan: at least 5 KB
  • Detection and Removal

    Automatic Removal:

    PestPatrol detects this.

    PestPatrol removes this.



    Manual Removal:

    Follow these steps to remove Lupin Trojan from your machine. Begin by backing up your registry and your system, and/or setting a Restore Point, to prevent trouble if you make a mistake.
    Remove Files:

    Remove these files (if present) with Windows Explorer:

    Research

    File Analyses:

    More Info:

  • AllTheWeb, AltaVista, AOL Search, Ask Jeeves, Google, HotBot, Lycos, LookSmart, MSN, Yahoo!
  • Research By:

  • PestPatrol's Pest Research Center
  • Last Revised:

    June 27, 2004