Knowledge (XXG)

Sub7

Source 📝

628: 295: 1146: 32: 465:). Customizations possible with the Sub7 server editor included changing the port addresses, displaying a customized message upon installation that could be used for example "to deceive the victim and mask the true intent of the program". The Sub7 server could also be configured to notify the controller of 485:
SubSeven has been used to gain unauthorized access to computers. While it can be used for making mischief (such as making sound files play out of nowhere, change screen colors, etc.), it can also read keystrokes that occurred since the last boot—a capability that can be used to steal passwords and
346:
No development had occurred for several years until version 2.3 in 2010. This release was based on the genuine SubSeven 2.2 and 2.1.3 source code, which mobman himself shared to his close friends, "Read101" and "fc" and were responsible for this update. Unfortunately, the reborn did not capture the
476:
analysis revealed however that "SubSeven's author has secretly included a hardcoded master password for all of his Trojans! The Trojan itself has been Trojaned". For Version 1.9 the master password is predatox and 14438136782715101980 for versions 2.1 through 2.2b. The Master Password for SubSeven
339:
In 2001, in an attempt to reinvent the design again, the v2.2x branch was created. It proved to be short-lived as its modular approach allowing for the creation of plugins and custom features did not resonate with users who lacked either the skills or the motivation to create new extensions and
358:
In October 2023, "IllWill", a former member of the Sub7 Crew from the 1990s and early 2000s, delivered a talk at BSides CT 2023. This presentation delved into the story behind mobman, revealing several unknown facts about the mysterious developer. The talk concluded with IllWill releasing the
350:
SubSeven 2.3, released on March 9, 2010, was revamped to work on all 32-bit and 64-bit versions of Windows and includes TCP Tunnel and Password Recovery for browsers, instant messengers and email clients. It was very buggy. The website that claimed to do this is no longer active.
354:
In June 2021, Jean-Pierre Lesueur (DarkCoderSc) released from scratch a complete remake of SubSeven version 2.2. This version maintained a similar look and feel to the original. Since then, development has ceased, and the source code has been made available to the public.
387:
once said that with these features, Sub7 allows a hacker to take "virtually complete control" over a computer. Sub7 is so invasive, he said, that anyone with it on their computer "might as well have the hacker standing right next to them" while using their computer.
460:
On the client-side the software had an "address book" that allowed the controller to know when the target computers are online. Additionally the server program could be customized before being delivered by a so-called server editor (an idea borrowed from
332:(BO). Mobman described SubSeven as a clone of BO. The inaugural branch of versions v1.0 to v1.9 restricted user experience to a single window, making them straightforward and easy to use. In a experimental version of 1.9, the SubSeven 1.9 1010: 362:
As of now, no other versions of SubSeven have been officially released, apart from version 2.1.2/3 by IllWill. The SubSeven 2.2 version remains exclusively in the possession of mobman, Read101, fc, and DarkCoderSc.
423:
account used on the target machine (back then the most popular messaging service); added in version 2.1. This included the ability to disable the local use of the account and read the chat history
1173: 347:
public's attention as anticipated. This lack of interest was primarily due to "fc", who was more interested in monetizing the new version than enhancing its quality.
1420: 1410: 340:
plugins. Thus, Mobman decided to continue the 2.1.x branch. In 2003 2.1.5, known as the "SubSeven Legends", marked the end of SubSeven development under Mobman.
1268: 1166: 1038: 343:
In 2006 (sub7legends.net) re-opened with hundreds of thousands of users, and has kept Sub7 alive with clean downloads and support and new software releases.
359:
official and genuine source code of SubSeven 2.1.2/3 in his Gitlab. This release was made possible by mobman's direct contribution and with his blessing.
1159: 964: 1202: 995: 809: 773: 743: 711: 608: 379:. The server is the program that the host must run in order to have their machines controlled remotely, and the client is the program with a 328:
Mobman released SubSeven on February 28, 1999. His first edition was titled SubSeven v1.0 carried echos of another Trojan of the time,
944: 384: 681: 115: 503:
Some versions of Sub7 include code from Hard Drive Killer Pro to format the hard drive; this code will only run if it matches the
53: 167: 148: 248:
backwards ("suBteN") and swapping "ten" with "seven". As of June 2021, the development of Sub7 is being continued.
96: 1042: 42: 1353: 1022: 546: 68: 1415: 526: 252: 237: 191: 1293: 1197: 263:
to come." Additionally Sub7 has some features deemed of little use in legitimate remote administration like
241: 75: 1134: 948: 849: 825: 500:(has no built-in self-propagation features) it has been leveraged by some worms such as W32/Leaves (2001). 441:"text2speech" voice synthesizer which allowed the remote controller to have the computer "talk" to its user 1238: 1182: 49: 251:
Because its typical use is to allow undetected and unauthorized access, Sub7 is usually described as a
82: 1233: 536: 454: 1343: 1248: 1243: 473: 186: 489:
In 2003, a hacker began distributing a Spanish-language email purporting to be from security firm
1273: 383:
that the user runs on their own machine to control the server/host PC. Computer security expert
376: 372: 64: 1109: 426:
features which were presumably intended to be used for prank or irritating purposes including:
1379: 991: 985: 805: 801: 769: 763: 739: 707: 701: 677: 671: 604: 521: 462: 264: 179: 598: 1298: 1011:
SANS, A Risk to Your Internet Security Chapter Name: "The Inner Workings of Sub7" on page 14
733: 446: 198: 174: 1218: 325:
SubSeven was developed by mobman, a computer programmer originally from Craiova, Romania.
398:
According to a security analysis, Sub7's server-side (target computer) features include:
395:(webcam capture, multiple port redirect, user-friendly registry editor, chat and more). 1145: 1139: 968: 897: 646: 490: 472:
Connections to Sub7 servers can be password protected with a chosen password. A deeper
794: 294: 1404: 1358: 1063: 497: 336:, Mobman revamped the previous blue/purple design that had been in use since v1.5. 1374: 1318: 1303: 516: 450: 329: 89: 1151: 1119: 255:
by security experts. Starting with version 2.1 (1999) it could be controlled via
244:- program originally released in February 1999. Its name was derived by spelling 551: 279: 31: 1328: 1283: 1258: 703:
Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks
466: 275: 271: 134: 1323: 1253: 1223: 873: 1348: 1338: 1333: 1308: 1278: 1114: 259:. As one security book phrased it: "This set the stage for all malicious 203: 20: 1288: 1263: 1228: 541: 531: 260: 1078: 1384: 1313: 1026: 392: 245: 570: 1144: 1129: 921: 1155: 504: 420: 380: 289: 256: 25: 371:
Like other remote admin programs, Sub7 is distributed with a
1124: 949:
The strange tale of the denial of service attacks on grc.com
1110:
http://www.giac.org/paper/gcih/36/subseven-213-bonus/100239
493:
that was used to trick recipients into downloading Sub7.
1104: 306: 214: 787: 785: 727: 725: 723: 416:
retrieving a listing of recorded and cached passwords
405:
sound files from a microphone attached to the machine
1064:"The CERT Division | Software Engineering Institute" 965:
Deconstructing SubSeven, the Trojan Horse of Choice.
700:
Mohssen Mohammed; Al-Sakib Khan Pathan (July 2013).
695: 693: 507:
number of "7889118" (mobman's rival trojan author.)
1367: 1211: 1190: 209: 197: 185: 173: 163: 147: 133: 56:. Unsourced material may be challenged and removed. 793: 469:changes of the host machine by email, ICQ or IRC. 757: 755: 278:family of operating systems, up to and including 768:. Jones & Bartlett Learning. pp. 521–. 1269:Microsoft System Center Configuration Manager 1167: 8: 128: 979: 977: 592: 590: 1174: 1160: 1152: 898:"BSides CT 2023 - illwill: FINDING MOBMAN" 629:"A Malware restrospective : SubSeven" 305: with: early history. You can help by 127: 732:Craig Schiller; James R. Binkley (2011). 116:Learn how and when to remove this message 959: 957: 562: 16:Trojan horse and remote access software 1421:Pascal (programming language) software 1411:Windows remote administration software 792:Cyrus Peikari; Anton Chuvakin (2004). 627:Lesueur, Jean-Pierre (July 18, 2023). 603:(2nd ed.). Elsevier. p. 63. 1203:Comparison of remote desktop software 432:opening and closing the optical drive 7: 1115:Darknet Diaries Podcast Ep 20:mobman 1013:notes several master passwords used. 735:Botnets: The Killer Web Applications 622: 620: 477:DEFCON8 2.1 Backdoor is acidphreak. 408:images from an attached video camera 54:adding citations to reliable sources 850:"A Malware retrospective: SubSeven" 826:"A Malware retrospective: SubSeven" 1120:Screenshot of subseven V2.2 readme 14: 762:Diane Barrett; Todd King (2005). 676:. Cengage Learning. p. 340. 990:. Sams Publishing. p. 569. 293: 30: 1135:Malware retrospective: SubSeven 765:Computer Networking Illuminated 670:Christopher A. Crayton (2003). 41:needs additional citations for 1041:. Symantec.com. Archived from 496:Although Sub7 is not itself a 1: 1368:Controversial Implementations 971:Information Security Reading 411:screen shots of the computer 391:Sub7 has more features than 963:Crapanzano, Jamie (2003), " 600:Network and System Security 1437: 800:. O'Reilly Media. p.  706:. CRC Press. p. 105. 438:turning the monitor off/on 435:swapping the mouse buttons 18: 1354:Virtual Network Computing 1125:https://come.to/subseven/ 1079:"Who is the real mobman?" 1039:"Symantec report on Sub7" 547:MiniPanzer and MegaPanzer 367:Architecture and features 159: 143: 1130:Sub7 2.1.2/3 Source Code 527:Trojan horse (computing) 192:Trojan horse (computing) 1294:Remote Desktop Services 1198:Remote desktop software 738:. Syngress. p. 8. 429:changing desktop colors 1149: 597:John R. Vacca (2013). 449:features, including a 240:- more specifically a 1239:Chrome Remote Desktop 1183:Remote administration 1148: 486:credit card numbers. 1234:Apple Remote Desktop 1077:admin (2018-12-14). 1045:on November 10, 2006 673:Security+ Exam Guide 537:Backdoor (computing) 50:improve this article 1249:ConnectWise Control 1244:Citrix Virtual Apps 474:reverse engineering 447:penetration testing 270:Sub7 worked on the 242:Remote Trojan Horse 130: 1274:NetSupport Manager 1150: 984:Eric Cole (2002). 481:Uses and incidents 135:Original author(s) 19:For the band, see 1398: 1397: 1380:Back Orifice 2000 997:978-0-7357-1009-2 811:978-0-596-55239-8 775:978-0-7637-2676-8 745:978-0-08-050023-2 713:978-1-4822-1905-0 610:978-0-12-416695-0 522:Back Orifice 2000 463:Back Orifice 2000 323: 322: 265:keystroke logging 223: 222: 180:Microsoft Windows 126: 125: 118: 100: 1428: 1299:Remote Utilities 1176: 1169: 1162: 1153: 1093: 1092: 1090: 1089: 1074: 1068: 1067: 1060: 1054: 1053: 1051: 1050: 1035: 1029: 1020: 1014: 1008: 1002: 1001: 981: 972: 961: 952: 942: 936: 935: 933: 932: 918: 912: 911: 909: 908: 894: 888: 887: 885: 884: 870: 864: 863: 861: 860: 846: 840: 839: 837: 836: 822: 816: 815: 799: 796:Security Warrior 789: 780: 779: 759: 750: 749: 729: 718: 717: 697: 688: 687: 667: 661: 660: 658: 657: 651:www.sub7crew.org 643: 637: 636: 624: 615: 614: 594: 585: 584: 582: 581: 575:www.sub7crew.org 567: 318: 315: 297: 290: 219: 216: 175:Operating system 131: 121: 114: 110: 107: 101: 99: 58: 34: 26: 1436: 1435: 1431: 1430: 1429: 1427: 1426: 1425: 1416:Windows trojans 1401: 1400: 1399: 1394: 1363: 1219:Absolute Manage 1212:Implementations 1207: 1186: 1180: 1101: 1096: 1087: 1085: 1076: 1075: 1071: 1062: 1061: 1057: 1048: 1046: 1037: 1036: 1032: 1021: 1017: 1009: 1005: 998: 983: 982: 975: 962: 955: 943: 939: 930: 928: 920: 919: 915: 906: 904: 902:www.youtube.com 896: 895: 891: 882: 880: 872: 871: 867: 858: 856: 848: 847: 843: 834: 832: 824: 823: 819: 812: 791: 790: 783: 776: 761: 760: 753: 746: 731: 730: 721: 714: 699: 698: 691: 684: 669: 668: 664: 655: 653: 645: 644: 640: 626: 625: 618: 611: 596: 595: 588: 579: 577: 569: 568: 564: 560: 513: 483: 455:port redirector 419:taking over an 369: 319: 313: 310: 303:needs expansion 288: 213: 155: 149:Preview release 122: 111: 105: 102: 59: 57: 47: 35: 24: 17: 12: 11: 5: 1434: 1432: 1424: 1423: 1418: 1413: 1403: 1402: 1396: 1395: 1393: 1392: 1387: 1382: 1377: 1371: 1369: 1365: 1364: 1362: 1361: 1356: 1351: 1346: 1341: 1336: 1331: 1326: 1321: 1316: 1311: 1306: 1301: 1296: 1291: 1286: 1281: 1276: 1271: 1266: 1261: 1256: 1251: 1246: 1241: 1236: 1231: 1226: 1221: 1215: 1213: 1209: 1208: 1206: 1205: 1200: 1194: 1192: 1188: 1187: 1181: 1179: 1178: 1171: 1164: 1156: 1143: 1142: 1140:Bsides CT 2023 1137: 1132: 1127: 1122: 1117: 1112: 1107: 1100: 1099:External links 1097: 1095: 1094: 1069: 1055: 1030: 1015: 1003: 996: 987:Hackers Beware 973: 969:SANS Institute 953: 937: 926:www.gitlab.com 913: 889: 878:www.github.com 865: 841: 817: 810: 781: 774: 751: 744: 719: 712: 689: 682: 662: 638: 616: 609: 586: 561: 559: 556: 555: 554: 549: 544: 539: 534: 529: 524: 519: 512: 509: 482: 479: 458: 457: 444: 443: 442: 439: 436: 433: 430: 424: 417: 414: 413: 412: 409: 406: 368: 365: 321: 320: 300: 298: 287: 284: 221: 220: 211: 207: 206: 201: 195: 194: 189: 183: 182: 177: 171: 170: 165: 161: 160: 157: 156: 153: 151: 145: 144: 141: 140: 137: 124: 123: 38: 36: 29: 15: 13: 10: 9: 6: 4: 3: 2: 1433: 1422: 1419: 1417: 1414: 1412: 1409: 1408: 1406: 1391: 1388: 1386: 1383: 1381: 1378: 1376: 1373: 1372: 1370: 1366: 1360: 1359:NX technology 1357: 1355: 1352: 1350: 1347: 1345: 1342: 1340: 1337: 1335: 1332: 1330: 1327: 1325: 1322: 1320: 1317: 1315: 1312: 1310: 1307: 1305: 1302: 1300: 1297: 1295: 1292: 1290: 1287: 1285: 1282: 1280: 1277: 1275: 1272: 1270: 1267: 1265: 1262: 1260: 1257: 1255: 1252: 1250: 1247: 1245: 1242: 1240: 1237: 1235: 1232: 1230: 1227: 1225: 1222: 1220: 1217: 1216: 1214: 1210: 1204: 1201: 1199: 1196: 1195: 1193: 1189: 1184: 1177: 1172: 1170: 1165: 1163: 1158: 1157: 1154: 1147: 1141: 1138: 1136: 1133: 1131: 1128: 1126: 1123: 1121: 1118: 1116: 1113: 1111: 1108: 1106: 1103: 1102: 1098: 1084: 1080: 1073: 1070: 1065: 1059: 1056: 1044: 1040: 1034: 1031: 1028: 1024: 1023:Sub7 analysis 1019: 1016: 1012: 1007: 1004: 999: 993: 989: 988: 980: 978: 974: 970: 966: 960: 958: 954: 951:. 2002-03-05. 950: 946: 945:Gibson, Steve 941: 938: 927: 923: 917: 914: 903: 899: 893: 890: 879: 875: 874:"Sub7 Legacy" 869: 866: 855: 851: 845: 842: 831: 827: 821: 818: 813: 807: 803: 798: 797: 788: 786: 782: 777: 771: 767: 766: 758: 756: 752: 747: 741: 737: 736: 728: 726: 724: 720: 715: 709: 705: 704: 696: 694: 690: 685: 683:1-58450-251-7 679: 675: 674: 666: 663: 652: 648: 647:"Sub7 Legacy" 642: 639: 634: 630: 623: 621: 617: 612: 606: 602: 601: 593: 591: 587: 576: 572: 571:"Sub7 Legacy" 566: 563: 557: 553: 550: 548: 545: 543: 540: 538: 535: 533: 530: 528: 525: 523: 520: 518: 515: 514: 510: 508: 506: 501: 499: 494: 492: 487: 480: 478: 475: 470: 468: 464: 456: 452: 448: 445: 440: 437: 434: 431: 428: 427: 425: 422: 418: 415: 410: 407: 404: 403: 401: 400: 399: 396: 394: 389: 386: 382: 378: 374: 366: 364: 360: 356: 352: 348: 344: 341: 337: 335: 331: 326: 317: 308: 304: 301:This section 299: 296: 292: 291: 285: 283: 281: 277: 273: 268: 266: 262: 258: 254: 249: 247: 243: 239: 235: 231: 227: 218: 212: 208: 205: 202: 200: 196: 193: 190: 188: 184: 181: 178: 176: 172: 169: 166: 162: 158: 154:2.3 / 2010 152: 150: 146: 142: 138: 136: 132: 120: 117: 109: 98: 95: 91: 88: 84: 81: 77: 74: 70: 67: –  66: 62: 61:Find sources: 55: 51: 45: 44: 39:This article 37: 33: 28: 27: 22: 1389: 1375:Back Orifice 1319:Secure Shell 1304:RescueAssist 1086:. Retrieved 1082: 1072: 1058: 1047:. Retrieved 1043:the original 1033: 1018: 1006: 986: 940: 929:. Retrieved 925: 916: 905:. Retrieved 901: 892: 881:. Retrieved 877: 868: 857:. Retrieved 853: 844: 833:. Retrieved 829: 820: 795: 764: 734: 702: 672: 665: 654:. Retrieved 650: 641: 632: 599: 578:. Retrieved 574: 565: 517:Back Orifice 502: 495: 488: 484: 471: 459: 451:port scanner 397: 390: 385:Steve Gibson 370: 361: 357: 353: 349: 345: 342: 338: 333: 330:Back Orifice 327: 324: 314:January 2014 311: 307:adding to it 302: 269: 253:trojan horse 250: 238:Trojan horse 233: 229: 225: 224: 112: 103: 93: 86: 79: 72: 60: 48:Please help 43:verification 40: 552:File binder 402:recording: 280:Windows 8.1 274:and on the 1405:Categories 1329:TeamViewer 1284:pcAnywhere 1259:IBM BigFix 1088:2020-07-15 1049:2012-08-28 931:2023-10-07 907:2023-10-07 883:2021-06-19 859:2024-02-05 854:medium.com 835:2024-02-05 830:medium.com 656:2021-06-19 580:2021-06-19 558:References 467:IP address 334:Apocalypse 276:Windows NT 272:Windows 9x 234:Sub7Server 164:Written in 106:April 2014 76:newspapers 1324:Splashtop 1254:Crossloop 1224:AetherPal 1349:UltraVNC 1344:Timbuktu 1339:TightVNC 1334:ThinLinc 1309:RustDesk 1279:NinjaOne 1185:software 511:See also 491:Symantec 230:SubSeven 215:sub7crew 204:freeware 21:Subseven 1289:RealVNC 1264:LogMeIn 1229:AnyDesk 1191:General 1105:Website 542:Rootkit 532:Malware 286:History 261:botnets 236:, is a 210:Website 199:License 90:scholar 1385:NetBus 1314:scrcpy 1083:illmob 1027:Sophos 994:  922:"Sub7" 808:  772:  742:  710:  680:  633:Medium 607:  453:and a 393:Netbus 377:client 375:and a 373:server 246:NetBus 168:Delphi 139:mobman 92:  85:  78:  71:  65:"Sub7" 63:  1025:from 228:, or 97:JSTOR 83:books 1390:Sub7 992:ISBN 806:ISBN 770:ISBN 740:ISBN 708:ISBN 678:ISBN 605:ISBN 498:worm 226:Sub7 217:.org 187:Type 129:Sub7 69:news 505:ICQ 421:ICQ 381:GUI 309:. 257:IRC 232:or 52:by 1407:: 1081:. 976:^ 967:, 956:^ 947:. 924:. 900:. 876:. 852:. 828:. 804:. 802:31 784:^ 754:^ 722:^ 692:^ 649:. 631:. 619:^ 589:^ 573:. 282:. 267:. 1175:e 1168:t 1161:v 1091:. 1066:. 1052:. 1000:. 934:. 910:. 886:. 862:. 838:. 814:. 778:. 748:. 716:. 686:. 659:. 635:. 613:. 583:. 316:) 312:( 119:) 113:( 108:) 104:( 94:· 87:· 80:· 73:· 46:. 23:.

Index

Subseven

verification
improve this article
adding citations to reliable sources
"Sub7"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
Original author(s)
Preview release
Delphi
Operating system
Microsoft Windows
Type
Trojan horse (computing)
License
freeware
sub7crew.org
Trojan horse
Remote Trojan Horse
NetBus
trojan horse
IRC
botnets
keystroke logging
Windows 9x

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.