Remote keylogger VIRUS

iVillage Member
Registered: 12-28-2003
Remote keylogger VIRUS
Fri, 03-11-2005 - 8:02pm

Remote Keylogger
The information below provides details about this pest.
Buy Online
Protect your data and your PC with eTrust™ PestPatrol® Anti-Spyware:
> Corporate Edition
> Home Edition

Overview

Alias
Trojan.Spy.RemoteKeyLog.a, Trojan.Spy.RemoteKeyLog.b,
Category
RAT : A Remote Administration Tool, or RAT, is a Trojan that when run, provides an attacker with the capability of remotely controlling a machine via a ""client"" in the attacker's machine, and a ""server"" in the victim's machine. Examples include Back Orifice, NetBus, SubSeven, and Hack'a'tack. What happens when a server is installed in a victim's machine depends on the capabilities of the trojan, the interests of the attacker, and whether or not control of the server is ever gained by another attacker -- who might have entirely different interests. Infections by remote administration Trojans on Windows machines are becoming as frequent as viruses. One common vector is through File and Print Sharing, when home users inadvertently open up their system to the rest of the world. If an attacker has access to the hard-drive, he/she can place the trojan in the startup folder. This will run the trojan the next time the user logs in. Another common vector is when the attacker simply e-mails the trojan to the user along with a social engineering hack that convinces the user to run it against their better judgment.

Variants
Remote Keylogger (a) · Remote Keylogger (b) ·

Origins

Author
Cryptic
Others By This Author
DaCryptic · Remote Keylogger (a) · Remote Keylogger (b) ·
Programming Language
Visual Basic
Date of Origin
May, 2000


Restart
HKLM\Software\Microsoft\Windows\CurrentVersion\Run HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "Monkeysoft"
Screenshot

Remote Keylogger (a)

Remote Keylogger (b)

Remote Keylogger

Remote Keylogger

Detection and Removal

Manual Removal
Follow these steps to remove Remote Keylogger from your machine. Begin by backing up your registry and your system, and/or setting a Restore Point, to prevent trouble if you make a mistake.