Cyber Predator
Cyber Predator is an Internet/Network security and activity monitor. In Real-Time it sniffs all internet/intranet/extranet traffic to and from the clientsâ browser looking for key (naughty) words in the content, and in real time will alert
a manager/administrator of the naughty activity, so the appropriate action can be taken. But that's not all, it also logs browser activity, so we can see what our traffic patterns are, who visited what site and when, this product not only identifies
the client IP address, but (if they are using Microsoft Windows and Microsoft Networking), it will tells the PC Name, and the user logged onto that PC at the time, Logon name and Full Name. It is a program that runs in the background, recording all
the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information
that could be used to compromise the system or be used in a social engineering attack.0
General information:
Malware Name: |
Cyber Predator |
Malware Type: |
Key Logger |
Company Name: |
Ingenuity (UK) Ltd |
Company URL: |
http://www.ingenuity.co.uk/
|
Threat Level: |
Elevated Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation. |
Company Description:
Spyware Description:
Cyber Predator is an Internet/Network security and activity monitor. In Real-Time it sniffs all internet/intranet/extranet traffic to and from the clientsâ browser looking for key (naughty) words in the content, and in real time will alert
a manager/administrator of the naughty activity, so the appropriate action can be taken. But that's not all, it also logs browser activity, so we can see what our traffic patterns are, who visited what site and when, this product not only identifies
the client IP address, but (if they are using Microsoft Windows and Microsoft Networking), it will tells the PC Name, and the user logged onto that PC at the time, Logon name and Full Name. It is a program that runs in the background, recording all
the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information
that could be used to compromise the system or be used in a social engineering attack.0
Characteristics/Symptoms:
-> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0
Additional information might be found here:
Processes Running:
CPMC.exe
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\Program Files\Cyber Predator\CPRTVC.exe |
201728 |
Application |
C:\Program Files\Cyber Predator\cprtdc.ini |
1304 |
Configuration Settings |
C:\Program Files\Cyber Predator\cprtdcsu.exe |
169984 |
Application |
Folder information Created after Installation:
Folder Location |
C:\Program Files\Cyber Predator |
C:\Program Files\Cyber Predator\Database |
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |
HKEY_CURRENT_USER |
\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Start Menu2\Programs\Cyber Predator |
Order |
HKEY_LOCAL_MACHINE |
SOFTWAREMicrosoftWindowsCurrentVersionUninstallCyber Predator V2.1 |
DisplayName |
HKEY_LOCAL_MACHINE |
\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Cyber Predator V2.1 |
UninstallString |