StealthActivityReporter
This is a commercial key logger that can monitor files within programs across a network or the Internet.This Keylogger emphases in recording of all screen activity, recording of applications in use, recording of keyboard data input, recording of internet
sites visited ,recording of Explorer folders, detailed activity reports, sorting, saving and printing activity reports, autostarting at windows startup or login, stealth operation (monitor computer activity silently without the operator being aware).
It also includes high risk threats that are typically installed without user interaction through security exploits, and can severely compromise system security. Such threats may open illicit network connections, use polymorphic tactics to self-mutate,
disable security software, modify system files, and install additional malware.0
General information:
Malware Name: |
StealthActivityReporter |
Malware Type: |
Key Logger |
Company Name: |
Stealth Activity Reporter |
Company URL: |
http://www.stealthactivityreporter.net/
|
Threat Level: |
Severe Risk |
Operating System: |
WIN XP |
Installation Type: |
Installed through EXE |
Operation: |
Time of After Installation. |
Company Description:
Stealth Activity Reporter is a easy to use tool to monitor the use/abuse of PCs: It logs keystrokes, user name, passwords, visited URLS, path names, access times and windows title of the active application. The information is stored in an encrypted
text file. We can deploy STAR via email! Simply send an e-mail to the person using the computer we want to monitor. STAR will then be installed silently on this computer and the person will never notice that this program is running. In the stealth
mode STAR does NOT show up in the system tray, task bar or task list! We can also invisibly email log file via SMTP/POP3 email accounts. The logging engine itself is a powerful small application that runs invisibly in the background, and we will not
notice at all that this application runs on PC
Spyware Description:
This is a commercial key logger that can monitor files within programs across a network or the Internet.This Keylogger emphases in recording of all screen activity, recording of applications in use, recording of keyboard data input, recording of internet
sites visited ,recording of Explorer folders, detailed activity reports, sorting, saving and printing activity reports, autostarting at windows startup or login, stealth operation (monitor computer activity silently without the operator being aware).
It also includes high risk threats that are typically installed without user interaction through security exploits, and can severely compromise system security. Such threats may open illicit network connections, use polymorphic tactics to self-mutate,
disable security software, modify system files, and install additional malware.0
Characteristics/Symptoms:
-> Starts with the operating system -> Intercepts keystrokes from the keyboard and records them in a log -> Run in stealth mode -> Monitor and capture data from computers0
Additional information might be found here:
Processes Running:
LoggerConfigurator.exe
File information Created after Installation:
File Location |
Size (Bytes) |
Type |
C:\Documents and Settings\All Users\Start Menu\Programs\Stealth Activity Reporter\Utilities\DecodeScreenShots.lnk |
613 |
Shortcut |
C:\Program Files\STAR\Help\monset_.jpg |
28097 |
JPEG Image |
C:\Program Files\STAR\Help\win9598NT.jpg |
2418 |
JPEG Image |
Folder information Created after Installation:
Folder Location |
C:\Program Files\STAR |
C:\Program Files\STAR\Help |
Registry information Created after Installation:
Main Registry Key |
Sub Registry Key |
Key Value Name |
HKEY_LOCAL_MACHINE |
\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
wsys |