ProBot

ProBot is a powerful and effective computer monitoring solution. Primary task of this feature-packed surveillance system is user activity event interception and logging. ProBot software maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used to restore computer usage history and generate detailed reports for administration. It provides Severe risk threats to the PC. Such threats are typically installed without user interaction through security exploits, and may allow an attacker to remotely control the infected machine. Such threats may allow the attacker to install additional malware and use the compromised machine to participate in denial of service attacks, spamming, and bot nets, or to transmit sensitive data to a remote server.0

General information:

Malware Name: ProBot
Malware Type: Key Logger
Company Name: NetHunter
Company URL: http://nethunter.cc/
Threat Level:
Operating System:
Installation Type:
Operation:

Company Description:

NetHunter Group is the Estonian software development company. NetHunter Group was founded in December 1999 and it is located in the ancient and beautiful capital of Estonia - Tallinn - right on the southern coast of The Gulf of Finland in the northern part of The Baltic Sea. It provides the following products for security of PC ProBot, HotLAN and ProBot SE

Spyware Description:

ProBot is a powerful and effective computer monitoring solution. Primary task of this feature-packed surveillance system is user activity event interception and logging. ProBot software maintains the detailed event log that is stored securely in binary files. Special tools provided within the package are used to restore computer usage history and generate detailed reports for administration. It provides Severe risk threats to the PC. Such threats are typically installed without user interaction through security exploits, and may allow an attacker to remotely control the infected machine. Such threats may allow the attacker to install additional malware and use the compromised machine to participate in denial of service attacks, spamming, and bot nets, or to transmit sensitive data to a remote server.0

Characteristics/Symptoms:

    -> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0

Additional information might be found here:

google Search at Google for ProBot
bing Search at Bing for ProBot
yahoo Search at Yahoo for ProBot

Processes Running:

pbcpl.exe

File information Created after Installation:

File Location Size (Bytes) Type
C:\Documents and Settings\Administrator\Start Menu\Programs\NetHunter ProBot\Tools\Export Wizard.lnk 585 Shortcut
C:\Documents and Settings\Administrator\Start Menu\Programs\NetHunter ProBot\Tools\Log Search Wizard.lnk 583 Shortcut
C:\Program Files\ProBot\Config\convtext.ini 877 Configuration Settings

Folder information Created after Installation:

Folder Location
C:\Program Files\ProBot
C:\Program Files\ProBot\Archive

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_LOCAL_MACHINE SOFTWARENetHunter GroupProBot dwLogURLs
HKEY_LOCAL_MACHINE SOFTWARENetHunter GroupProBot dwLogWindows
HKEY_LOCAL_MACHINE SOFTWARENetHunter GroupProBot dwMaxLogSize