Event ID - 21957

Port No21957
Service NameLatinus
RFC Doc0
ProtocolTCP
Description This backdoor program compromises system security by enabling remote users to access and control the affected system. Once installed, it waits for commands from the remote user, which it processes locally on the affected machine. It enables an attacker to do the following: Hide/display desktop icons, Hide/display the start button ,Hide/display taskbar icons ,Hide/display the taskbar clock,Turn on/off the monitor ,Enable/disable the hot key Alt+Ctrl+Del ,Open/close the CD-ROM door ,Enable/disable the Scroll Lock, NumLock, CapsLock ,Erase or change the contents of the clipboard ,Enable/disable the clipboard ,Modify the system date and time ,Lock/unlock the mouse and keyboard ,Change the mouse settings ,Change the display settings ,Minimize/maximize or change the title of a window ,Enable/disable and hide/display a window ,Change the wallpaper ,Change the computer name ,Execute/delete files ,This malware also has keylogging functionalities. It stores all captured keystrokes to the log file KEYS.TXT in the Windows directory.
Reference Link Latinus Trojan
AttackSOLUTION :
AUTOMATIC REMOVAL INSTRUCTIONS
To automatically remove this malware from your system, please use Trend Micro Damage Cleanup Engine and Template.

MANUAL REMOVAL INSTRUCTIONS
Identifying the Malware Program
Before proceeding to remove this malware, first identify the malware program.
Scan your system with Trend Micro antivirus and NOTE all files detected as BKDR_LATINUS.A. To do this, Trend Micro customers must download the latest pattern file and scan their system. Other Internet users can use HouseCall, Trend Micro's free online virus scanner.

Terminating the Malware Program
This procedure terminates the running malware process from memory. You will need the name(s) of the file(s) detected earlier.

1.Open Windows Task Manager.
On Windows 95/98/ME systems, pressCTRL+ALT+DELETE
On Windows NT/2000/XP systems, pressCTRL+SHIFT+ESC, then click the Processes tab.
2.In the list of running programs*, locate the malware file or files detected earlier.
3.Select one of the detected files, then press either the End Task or the End Process button, depending on the version of Windows on your system.
4.Do the same for all detected malware files in the list of running processes.
5.To check if the malware process has been terminated, close Task Manager, and then open it again.
6.Close Task Manager.
NOTE :
On systems running Windows 95/98/ME, Task Manager may not show certain processes. You may use a third party process viewer to terminate the malware process. Otherwise, continue with the next procedure, noting additional instructions

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.