SpyMon
SpyMon is a surveillance tool that logs all the keystrokes on the victim's computer.Spymon helps user to see all keys pressed as they are pressed and can even view windows and webcams of the victim's machine. It includes high risk threats
that are typically installed without user interaction through security exploits, and can severely compromise system security. Such threats may open illicit network connections, use polymorphic tactics to self-mutate, disable security software, modify
system files, and install additional malware. These threats may also collect and transmit personally identifiable information (PII) without your consent and severely degrade the performance and stability of your computer.0
General information:
Malware Name: |
SpyMon |
Malware Type: |
Key Logger |
Company Name: |
SpyMon |
Company URL: |
http://spymon.com/
|
Threat Level: |
High Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation. |
Company Description:
SpyMon is a computer program that allows to monitor other computers in real-time. We see all keys pressed, can grab screens or webcam views, and much, much more. This is much better than similar programs that âemailâ keys pressed at
predefined times. The complementing program to SpyMon is DataSneak; a âcreatorâ for making custom versions of âDataSneakâ installers is built-in to SpyMon free-of-charge. With it we can install the DataSneak client
onto an unlimited amount of computers. The number of simultaneous connections to SpyMon server is controlled by SpyMon license.
Spyware Description:
SpyMon is a surveillance tool that logs all the keystrokes on the victim's computer.Spymon helps user to see all keys pressed as they are pressed and can even view windows and webcams of the victim's machine. It includes high risk threats
that are typically installed without user interaction through security exploits, and can severely compromise system security. Such threats may open illicit network connections, use polymorphic tactics to self-mutate, disable security software, modify
system files, and install additional malware. These threats may also collect and transmit personally identifiable information (PII) without your consent and severely degrade the performance and stability of your computer.0
Characteristics/Symptoms:
-> Monitor and capture data from computers -> Negatively affect the performance and stability of the system -> Run in stealth mode -> Monitor and capture data from computers0
Additional information might be found here:
Processes Running:
SpyMon.exe
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\Documents and Settings\[USER]\Desktop\SpyMon.LNK |
1426 |
Shortcut |
C:\Documents and Settings\[USER]\Start Menu\Programs\SpyMon\UnInstall.LNK |
1467 |
Shortcut |
C:\Program Files\SpyMon\SpyMon.dat |
818559 |
DAT File |
Folder information Created after Installation:
Folder Location |
C:\Program Files\SpyMon |
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |
HKEY_LOCAL_MACHINE |
\SOFTWARE\SpyMon |
MaxClients |
HKEY_LOCAL_MACHINE |
\SOFTWARE\SpyMon |
SeenWarn |
HKEY_LOCAL_MACHINE |
\SOFTWARE\SpyMon |
SetupDir |