prompt
stringclasses
508 values
procedure
stringlengths
20
478
Input Capture:Keylogging
Fysbis can perform keylogging.
Input Capture:Keylogging
gh0st RAT has a keylogger.
Input Capture:Keylogging
Grandoreiro can log keystrokes on the victim's machine.
Input Capture:Keylogging
GreyEnergy has a module to harvest pressed keystrokes.
Input Capture:Keylogging
Malware used by It is capable of capturing keystrokes.
Input Capture:Keylogging
The executable version of Helminth has a module to log keystrokes.
Input Capture:Keylogging
It has used a PowerShell-based keylogger named kl.ps1.
Input Capture:Keylogging
HTTPBrowser is capable of capturing keystrokes on victims.
Input Capture:Keylogging
Imminent Monitor has a keylogging module.
Input Capture:Keylogging
InvisiMole can capture keystrokes on a compromised host.
Input Capture:Keylogging
JPIN contains a custom keylogger.
Input Capture:Keylogging
jRAT has the capability to log keystrokes from the victim’s machine, both offline and online.
Input Capture:Keylogging
Kasidet has the ability to initiate keylogging.
Input Capture:Keylogging
It has used keyloggers.
Input Capture:Keylogging
KeyBoy installs a keylogger for intercepting credentials and keystrokes.
Input Capture:Keylogging
KGH_SPY can perform keylogging by polling the GetAsyncKeyState() function.
Input Capture:Keylogging
It has used a PowerShell-based keylogger as well as a tool called MECHANICAL to log keystrokes.
Input Capture:Keylogging
Kivars has the ability to initiate keylogging on the infected host.
Input Capture:Keylogging
KONNI has the capability to perform keylogging.
Input Capture:Keylogging
It malware KiloAlfa contains keylogging functionality.
Input Capture:Keylogging
Lokibot has the ability to capture input on the compromised host via keylogging.
Input Capture:Keylogging
It logs keystrokes from the victim’s machine.
Input Capture:Keylogging
MacMa can use Core Graphics Event Taps to intercept user keystrokes from any text input field and saves them to text files. Text input fields include Spotlight, Finder, Safari, Mail, Messages, and other apps that have text fields for passwords.
Input Capture:Keylogging
MacSpy captures keystrokes.
Input Capture:Keylogging
It malware is capable of keylogging.
Input Capture:Keylogging
MarkiRAT can capture all keystrokes on a compromised host.
Input Capture:Keylogging
Matryoshka is capable of keylogging.
Input Capture:Keylogging
It has used key loggers to steal usernames and passwords.
Input Capture:Keylogging
metaMain has the ability to log keyboard events.
Input Capture:Keylogging
Metamorfo has a command to launch a keylogger and capture keystrokes on the victim’s machine.
Input Capture:Keylogging
Micropsia has keylogging capabilities.
Input Capture:Keylogging
MoonWind has a keylogger.
Input Capture:Keylogging
NanoCore can perform keylogging on the victim’s machine.
Input Capture:Keylogging
NavRAT logs the keystrokes on the targeted system.
Input Capture:Keylogging
NetTraveler contains a keylogger.
Input Capture:Keylogging
NETWIRE can perform keylogging.
Input Capture:Keylogging
NightClub can use a plugin for keylogging.
Input Capture:Keylogging
njRAT is capable of logging keystrokes.
Input Capture:Keylogging
It has used keylogging tools called KEYPUNCH and LONGWATCH.
Input Capture:Keylogging
Okrum was seen using a keylogger tool to capture keystrokes.
Input Capture:Keylogging
During Operation Wocao, threat actors obtained the password for the victim's password manager via a custom keylogger.
Input Capture:Keylogging
OwaAuth captures and DES-encrypts credentials before writing the username and password to a log file, C:\log.txt.
Input Capture:Keylogging
PcShare has the ability to capture keystrokes.
Input Capture:Keylogging
Peppy can log keystrokes on compromised hosts.
Input Capture:Keylogging
It has used several different keyloggers.
Input Capture:Keylogging
PlugX has a module for capturing keystrokes per process including window titles.
Input Capture:Keylogging
PoetRAT has used a Python tool named klog.exe for keylogging.
Input Capture:Keylogging
PoisonIvy contains a keylogger.
Input Capture:Keylogging
PoshC2 has modules for keystroke logging and capturing credentials from spoofed Outlook authentication messages.
Input Capture:Keylogging
PowerLess can use a module to log keystrokes.
Input Capture:Keylogging
PowerSploit's Get-Keystrokes Exfiltration module can log keystrokes.
Input Capture:Keylogging
Prikormka contains a keylogger module that collects keystrokes and the titles of foreground windows.
Input Capture:Keylogging
Proton uses a keylogger to capture keystrokes.
Input Capture:Keylogging
Pupy uses a keylogger to capture keystrokes it then sends back to the server after it is stopped.
Input Capture:Keylogging
QakBot can capture keystrokes on a compromised host.
Input Capture:Keylogging
QuasarRAT has a built-in keylogger.
Input Capture:Keylogging
RCSession has the ability to capture keystrokes on a compromised host.
Input Capture:Keylogging
Regin contains a keylogger.
Input Capture:Keylogging
Remcos has a command for keylogging.
Input Capture:Keylogging
Remexi gathers and exfiltrates keystrokes from the machine.
Input Capture:Keylogging
Remsec contains a keylogger component.
Input Capture:Keylogging
Revenge RAT has a plugin for keylogging.
Input Capture:Keylogging
ROKRAT can use SetWindowsHookEx and GetKeyNameText to capture keystrokes.
Input Capture:Keylogging
Rover has keylogging functionality.
Input Capture:Keylogging
It can record keystrokes from both the keyboard and virtual keyboard.
Input Capture:Keylogging
RunningRAT captures keystrokes and sends them back to the C2 server.
Input Capture:Keylogging
It has used a keylogger to capture keystrokes by using the SetWindowsHookEx function.
Input Capture:Keylogging
SILENTTRINITY has a keylogging capability.
Input Capture:Keylogging
SLOTHFULMEDIA has a keylogging capability.
Input Capture:Keylogging
SMOKEDHAM can continuously capture keystrokes.
Input Capture:Keylogging
It has used keylogging tools.
Input Capture:Keylogging
SslMM creates a new thread implementing a keylogging facility using Windows Keyboard Accelerators.
Input Capture:Keylogging
Sykipot contains keylogging functionality to steal passwords.
Input Capture:Keylogging
TajMahal has the ability to capture keystrokes on an infected host.
Input Capture:Keylogging
ThiefQuest uses the CGEventTap functions to perform keylogging.
Input Capture:Keylogging
It actors installed a credential logger on Microsoft Exchange servers. It also leveraged the reconnaissance framework, ScanBox, to capture keystrokes.
Input Capture:Keylogging
TinyZBot contains keylogger functionality.
Input Capture:Keylogging
It has used keylogging tools in their operations.
Input Capture:Keylogging
Trojan.Karagany can capture keystrokes on a compromised host.
Input Capture:Keylogging
Unknown Logger is capable of recording keystrokes.
Input Capture:Keylogging
VERMIN collects keystrokes from the victim machine.
Input Capture:Keylogging
WarzoneRAT has the capability to install a live and offline keylogger, including through the use of the GetAsyncKeyState Windows API.
Input Capture:Keylogging
XAgentOSX contains keylogging functionality that will monitor for active application windows and write them to the log, it can handle special characters, and it will buffer by default 50 characters before sending them out over the C2 infrastructure.
Input Capture:Keylogging
yty uses a keylogger plugin to gather keystrokes.
Input Capture:Keylogging
Zeus Panda can perform keylogging on the victim’s machine by hooking the functions TranslateMessage and WM_KEYDOWN.
Input Capture:Keylogging
ZxShell has a feature to capture a remote computer's keystrokes using a keylogger.
Input Capture:GUI Input Capture
Bundlore prompts the user for their credentials.
Input Capture:GUI Input Capture
Calisto presents an input prompt asking for the user's login and password.
Input Capture:GUI Input Capture
Dok prompts the user for credentials.
Input Capture:GUI Input Capture
It has presented victims with spoofed Windows Authentication prompts to collect their credentials.
Input Capture:GUI Input Capture
iKitten prompts the user for their credentials.
Input Capture:GUI Input Capture
Keydnap prompts the users for credentials.
Input Capture:GUI Input Capture
Metamorfo has displayed fake forms on top of banking sites to intercept credentials from victims.
Input Capture:GUI Input Capture
Proton prompts users for their credentials.
Input Capture:GUI Input Capture
SILENTTRINITY's credphisher.py module can prompt a current user for their credentials.
Input Capture:GUI Input Capture
XCSSET prompts the user to input credentials using a native macOS dialog box leveraging the system process /Applications/Safari.app/Contents/MacOS/SafariForWebKitDevelopment.
Input Capture:Web Portal Capture
The IceApple OWA credential logger can monitor for OWA authentication requests and log the credentials.
Input Capture:Credential API Hooking
Carberp has hooked several Windows API functions to steal credentials.
Input Capture:Credential API Hooking
Empire contains some modules that leverage API hooking to carry out tasks, such as netripper.
Input Capture:Credential API Hooking
FinFisher hooks processes by modifying IAT pointers to CreateWindowEx.