Event ID - 27374

Port No27374
Service NameSubSeven
RFC Doc0
ProtocolTCP
DescriptionSubSeven 2.1 Bonus fixed the following bugs: IRC bot, AIM spy, ICQ spy, and offline key logger. The 2.1 bonus client also included a password bypass feature. Any previous server could have it's password protection removed. However all new servers are immune to this feature
Reference LinkSubSeven
AttackAutoloads: varies from Registry, System.ini, Win.ini

Features:

App redirect
Change icon of SubSeven server
Change resolution
Change server port
Change time and date
Change windows colors
Client can bypass all previous server's password protection
Clipboard viewer/editor
Compress/Decompress file before and after transfer
Disable keyboard
Download/upload
Edit File
Edit registry
File explorer
Flip screen
Get AIM/ICQ users and passwords
Get cached passwords
Get server home info(Address, name, phone number, etc..)
Hangup modem
Hide/move mouse
Hide/show desktop/start button/taskbar
ICQ Spy
ICQ Takeover
ICQ/IRC/Email notify
Info about computer
IP Scanner
IP Tool
IRC Bot
Keylog
Message manager
Microsoft Messenger Spy
Move mouse
Open browser
Open/close cdrom
Perform clicks on server's desktop
Ping server
Play wav
Print
Print a txt file
Process viewer
Record sound
Restart server
Scroll/nums/caps locks on/off
Send keys
Set volume
Set volume
Set wallpaper
Set/Change screen saver settings
Show image
Start/stop speaker
Text2Speech
The matrix(Black screen, green writing..)
Update server
View/disable x/show/hide/focus/close applications
Webcam
Yahoo Messenger Spy

Fix:
Remove the Winloader key in the registry located at either HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run or HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices. Which can be done with regedit or any other registry editing program.
Open the system.ini(Usually c:\windows\system.ini) and change the key: shell=Explore.exe some random name.exe. under [boot], to shell=explorer.exe. This can be done with any text editing program.
Open the win.ini(Usually c:\windows\win.ini) and remove the key: run=some random name.exe under [Windows], this can be done with any text editing program.
Change the default value at HKEY_LOCAL_MACHINE\SOFTWARE\exefile\shell\open\command to nothing("").
Reboot the computer or close the trojan.
Delete the trojan file some random name.exe in the windows directory

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.