SC-Keylog Pro

SC-KeyLog is a powerful, invisible keylogger that captures user activity and saves it to an encrypted logfile. SC-KeyLog is highly customizable, easy to use and creates exceptionally small custom keylogger engines of only 40 KB in size! Create as many keylogger engines as we like and deploy them on remote systems with ease. An optional mailing feature allows to automatically send the logfile to a specified email address on a user defined interval. It is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or be used in a social engineering attack. For example, a key logger will reveal the contents of all e-mail composed by the user.0

General information:

Malware Name: SC-Keylog Pro
Malware Type: Key Logger
Company Name: Soft-Central
Company URL: http://www.soft-central.net/
Threat Level: Elevated Risk
Operating System: WIN XP
Installation Type: Installed through EXE
Operation: Time of After Installation.

Company Description:

Spyware Description:

SC-KeyLog is a powerful, invisible keylogger that captures user activity and saves it to an encrypted logfile. SC-KeyLog is highly customizable, easy to use and creates exceptionally small custom keylogger engines of only 40 KB in size! Create as many keylogger engines as we like and deploy them on remote systems with ease. An optional mailing feature allows to automatically send the logfile to a specified email address on a user defined interval. It is a program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or be used in a social engineering attack. For example, a key logger will reveal the contents of all e-mail composed by the user.0

Characteristics/Symptoms:

    -> Monitor and capture data from computers -> Run in stealth mode -> Intercepts keystrokes from the keyboard and records them in a log -> Starts with the operating system0

Additional information might be found here:

google Search at Google for SC-Keylog Pro
bing Search at Bing for SC-Keylog Pro
yahoo Search at Yahoo for SC-Keylog Pro

Processes Running:

Main.exe

File information Created after Installation:

File Location Size (Bytes) Type
C:\Documents and Settings\[USER]\Start Menu\Programs\SC-KeyLog PRO DEMO\Documentation.lnk 644 Shortcut
C:\Documents and Settings\[USER]\Start Menu\Programs\SC-KeyLog PRO DEMO\Main.lnk 644 Shortcut
C:\Documents and Settings\[USER]\Start Menu\Programs\SC-KeyLog PRO DEMO\Uninstall.lnk 673 Shortcut

Folder information Created after Installation:

Folder Location
C:\Program Files\SC-KeyLog PRO DEMO

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_LOCAL_MACHINE SOFTWAREMicrosoftWindowsCurrentVersionUninstallSC-KeyLog PRO DisplayIcon
HKEY_LOCAL_MACHINE SOFTWAREMicrosoftWindowsCurrentVersionUninstallSC-KeyLog PRO DisplayName
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SC-KeyLog PRO UninstallString