|| Remote Keylogger
|| - Alias: Achtung
High risk threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction. May open up communication ports, use polymorphic tactics, stealth installations, and/or anti-spy counter measures. May use a security flaw in the operating system to gain access to your computer.
||Remote Keylogger records every keystrok.
It records every keystrok as well as send all those record via e-mail to a remote user.
||process: UnInstall_1.exe: MD5 Hash: 57c8e4d6dc0912a59a9...
process: rkl.exe: MD5 Hash: fa88b229f6122cf2bc7...
process: keylogger.exe: MD5 Hash: 2888012b7255f905658...
process: keylogger.exe: MD5 Hash: 2888012b7255f905658..
||Key Logger - A key logger program runs in the background, recording all the keystrokes made by a user. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped secretly raw to the attacker via email or over the Internet.