Cyber Predator

Cyber Predator is an Internet/Network security and activity monitor. In Real-Time it sniffs all internet/intranet/extranet traffic to and from the clients’ browser looking for key (naughty) words in the content, and in real time will alert a manager/administrator of the naughty activity, so the appropriate action can be taken. But that's not all, it also logs browser activity, so we can see what our traffic patterns are, who visited what site and when, this product not only identifies the client IP address, but (if they are using Microsoft Windows and Microsoft Networking), it will tells the PC Name, and the user logged onto that PC at the time, Logon name and Full Name. It is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or be used in a social engineering attack.0

General information:

Malware Name: Cyber Predator
Malware Type: Key Logger
Company Name: Ingenuity (UK) Ltd
Company URL: http://www.ingenuity.co.uk/
Threat Level: Elevated Risk
Operating System: WIN XP
Installation Type: Installed through EXE
Operation: Time of After Installation.

Company Description:

Spyware Description:

Cyber Predator is an Internet/Network security and activity monitor. In Real-Time it sniffs all internet/intranet/extranet traffic to and from the clients’ browser looking for key (naughty) words in the content, and in real time will alert a manager/administrator of the naughty activity, so the appropriate action can be taken. But that's not all, it also logs browser activity, so we can see what our traffic patterns are, who visited what site and when, this product not only identifies the client IP address, but (if they are using Microsoft Windows and Microsoft Networking), it will tells the PC Name, and the user logged onto that PC at the time, Logon name and Full Name. It is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or be used in a social engineering attack.0

Characteristics/Symptoms:

    -> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0

Additional information might be found here:

google Search at Google for Cyber Predator
bing Search at Bing for Cyber Predator
yahoo Search at Yahoo for Cyber Predator

Processes Running:

CPMC.exe

File information Created after Installation:

File Location Size (Bytes) Type
C:\Program Files\Cyber Predator\CPRTVC.exe 201728 Application
C:\Program Files\Cyber Predator\cprtdc.ini 1304 Configuration Settings
C:\Program Files\Cyber Predator\cprtdcsu.exe 169984 Application

Folder information Created after Installation:

Folder Location
C:\Program Files\Cyber Predator
C:\Program Files\Cyber Predator\Database

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_CURRENT_USER \Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Start Menu2\Programs\Cyber Predator Order
HKEY_LOCAL_MACHINE SOFTWAREMicrosoftWindowsCurrentVersionUninstallCyber Predator V2.1 DisplayName
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Cyber Predator V2.1 UninstallString