Absolute Keylogger

By GoldSparrow in Potentially Unwanted Programs

Threat Scorecard

Popularity Rank: 13,289
Threat Level: 100 % (High)
Infected Computers: 8,235
First Seen: May 9, 2023
Last Seen: October 26, 2025
OS(es) Affected: Windows

The Absolute Keylogger software is promoted as a system-monitoring tool that can be used in companies to keep track of employees not exporting in-house technologies and keeping up with the browsing habits of their kids. Unfortunately, the Absolute Keylogger is valued among threat actors as well, due to its core functionality and ability to run as a hidden service called 'Nsetup.exe.' The Absolute Keylogger software may be modified by threat actors, and it may be found on computers that have been compromised with a Trojan-Dropper initially. The Absolute Keylogger might be used to record the passwords, usernames, and sensitive data hosted on an infected system. The Absolute Keylogger suite is stated to support various advanced features in addition to basic functionality like the keyboard input recording, the screen grabbing and the monitoring of open programs. Malware researchers warn that the Absolute Keylogger can:

  • Copy your emails and send them to its operators.
  • Export your Internet browsing history.
  • Run on Windows boot.
  • Disable security mechanisms in Windows.
  • Export keylog reports via an encrypted channel.

Moreover, the creators of the Absolute Keylogger offer a Web panel for the Absolute Keylogger that allows you to track the activity of devices that have the keylogger installed. The Absolute Keylogger Web panel allows for easy monitoring over a secure connection. Interested parties are invited to subscribe and pay a monthly fee that ensures updates to the Absolute Keylogger, which are going to be installed automatically. The Absolute Keylogger is classified by AV companies as a Potentially Unwanted Program (PUP) that might be installed on the PCs of unsuspecting users. Absolute Keylogger may enable threat actors to collect information like your online banking credentials, record your messages in IM apps, hijack your social media accounts and obtain your credit card data. AV engines might flag the Absolute Keylogger as:

  • Gen:Trojan.Heur.GZ.XHW@bmjp79b
  • HEUR/QVM20.1.67ED.Malware.Gen
  • Hacktool ( 700007861 )
  • TROJ_GEN.R03FC0WLN17
  • Trojan ( 00522c7e1 )
  • Trojan.Generic.DA296
  • Trojan.GenericKDZ.41622
  • malicious.d0c578

Analysis Report

General information

Family Name: STOP.VATQ Ransomware
Signature status: No Signature

Known Samples

MD5: 1298020a3658bae11d301a03340cc3f7
SHA1: 4d62dbab164a44bca8e7ed8baeae94193cce353d
SHA256: 9A015F956E1D5089F9893FDCFDF570D7E496D3728913055DB062A3AE6416ADA8
File Size: 255.49 KB, 255488 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
File Descriptions Phantom
Internal Name Flowers.exe
Legal Trademark1 Gurufes
Legal Trademarks2 Gunshut
Original Filename Buskepas.exe
Product Version 76.47.92.68

File Traits

  • HighEntropy
  • x86

Block Information

Total Blocks: 462
Potentially Malicious Blocks: 4
Whitelisted Blocks: 452
Unknown Blocks: 6

Visual Map

0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 1 1 1 0 1 1 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 2 2 0 0 0 1 0 1 0 0 0 0 1 1 0 1 0 1 1 0 0 0 1 0 0 0 0 0 0 0 0 0 2 1 1 3 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 3 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 1 0 0 2 2 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? 0 ? ? x
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Related Posts

Trending

Most Viewed

Loading...