SC-Keylog Pro
SC-KeyLog is a powerful, invisible keylogger that captures user activity and saves it to an encrypted logfile. SC-KeyLog is highly customizable, easy to use and creates exceptionally small custom keylogger engines of only 40 KB in size! Create as
many keylogger engines as we like and deploy them on remote systems with ease. An optional mailing feature allows to automatically send the logfile to a specified email address on a user defined interval. It is a program that runs in the background,
recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful
information that could be used to compromise the system or be used in a social engineering attack. For example, a key logger will reveal the contents of all e-mail composed by the user.0
General information:
Malware Name: |
SC-Keylog Pro |
Malware Type: |
Key Logger |
Company Name: |
Soft-Central |
Company URL: |
http://www.soft-central.net/
|
Threat Level: |
Elevated Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation. |
Company Description:
Spyware Description:
SC-KeyLog is a powerful, invisible keylogger that captures user activity and saves it to an encrypted logfile. SC-KeyLog is highly customizable, easy to use and creates exceptionally small custom keylogger engines of only 40 KB in size! Create as
many keylogger engines as we like and deploy them on remote systems with ease. An optional mailing feature allows to automatically send the logfile to a specified email address on a user defined interval. It is a program that runs in the background,
recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful
information that could be used to compromise the system or be used in a social engineering attack. For example, a key logger will reveal the contents of all e-mail composed by the user.0
Characteristics/Symptoms:
-> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0
Additional information might be found here:
Processes Running:
Main.exe
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\Documents and Settings\[USER]\Start Menu\Programs\SC-KeyLog PRO DEMO\Documentation.lnk |
644 |
Shortcut |
C:\Documents and Settings\[USER]\Start Menu\Programs\SC-KeyLog PRO DEMO\Main.lnk |
644 |
Shortcut |
C:\Documents and Settings\[USER]\Start Menu\Programs\SC-KeyLog PRO DEMO\Uninstall.lnk |
673 |
Shortcut |
Folder information Created after Installation:
Folder Location |
C:\Program Files\SC-KeyLog PRO DEMO |
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |
HKEY_LOCAL_MACHINE |
SOFTWAREMicrosoftWindowsCurrentVersionUninstallSC-KeyLog PRO |
DisplayIcon |
HKEY_LOCAL_MACHINE |
SOFTWAREMicrosoftWindowsCurrentVersionUninstallSC-KeyLog PRO |
DisplayName |
HKEY_LOCAL_MACHINE |
\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SC-KeyLog PRO |
UninstallString |