StealthActivityReporter

This is a commercial key logger that can monitor files within programs across a network or the Internet.This Keylogger emphases in recording of all screen activity, recording of applications in use, recording of keyboard data input, recording of internet sites visited ,recording of Explorer folders, detailed activity reports, sorting, saving and printing activity reports, autostarting at windows startup or login, stealth operation (monitor computer activity silently without the operator being aware). It also includes high risk threats that are typically installed without user interaction through security exploits, and can severely compromise system security. Such threats may open illicit network connections, use polymorphic tactics to self-mutate, disable security software, modify system files, and install additional malware.0

General information:

Malware Name: StealthActivityReporter
Malware Type: Key Logger
Company Name: Stealth Activity Reporter
Company URL: http://www.stealthactivityreporter.net/
Threat Level: Severe Risk
Operating System: WIN XP
Installation Type: Installed through EXE
Operation: Time of After Installation.

Company Description:

Stealth Activity Reporter is a easy to use tool to monitor the use/abuse of PCs: It logs keystrokes, user name, passwords, visited URLS, path names, access times and windows title of the active application. The information is stored in an encrypted text file. We can deploy STAR via email! Simply send an e-mail to the person using the computer we want to monitor. STAR will then be installed silently on this computer and the person will never notice that this program is running. In the stealth mode STAR does NOT show up in the system tray, task bar or task list! We can also invisibly email log file via SMTP/POP3 email accounts. The logging engine itself is a powerful small application that runs invisibly in the background, and we will not notice at all that this application runs on PC

Spyware Description:

This is a commercial key logger that can monitor files within programs across a network or the Internet.This Keylogger emphases in recording of all screen activity, recording of applications in use, recording of keyboard data input, recording of internet sites visited ,recording of Explorer folders, detailed activity reports, sorting, saving and printing activity reports, autostarting at windows startup or login, stealth operation (monitor computer activity silently without the operator being aware). It also includes high risk threats that are typically installed without user interaction through security exploits, and can severely compromise system security. Such threats may open illicit network connections, use polymorphic tactics to self-mutate, disable security software, modify system files, and install additional malware.0

Characteristics/Symptoms:

    -> Starts with the operating system -> Intercepts keystrokes from the keyboard and records them in a log -> Run in stealth mode -> Monitor and capture data from computers0

Additional information might be found here:

google Search at Google for StealthActivityReporter
bing Search at Bing for StealthActivityReporter
yahoo Search at Yahoo for StealthActivityReporter

Processes Running:

LoggerConfigurator.exe

File information Created after Installation:

File Location Size (Bytes) Type
C:\Documents and Settings\All Users\Start Menu\Programs\Stealth Activity Reporter\Utilities\DecodeScreenShots.lnk 613 Shortcut
C:\Program Files\STAR\Help\monset_.jpg 28097 JPEG Image
C:\Program Files\STAR\Help\win9598NT.jpg 2418 JPEG Image

Folder information Created after Installation:

Folder Location
C:\Program Files\STAR
C:\Program Files\STAR\Help

Registry information Created after Installation:

Main Registry Key Sub Registry Key Key Value Name
HKEY_LOCAL_MACHINE \SOFTWARE\Microsoft\Windows\CurrentVersion\Run wsys