prompt
stringclasses
508 values
procedure
stringlengths
20
478
Input Capture:Credential API Hooking
NOKKI uses the Windows call SetWindowsHookEx and begins injecting it into every GUI process running on the victim's machine.
Input Capture:Credential API Hooking
It is capable of using Windows hook interfaces for information gathering such as credential access.
Input Capture:Credential API Hooking
RDFSNIFFER hooks several Win32 API functions to hijack elements of the remote system management user-interface.
Input Capture:Credential API Hooking
TrickBot has the ability to capture RDP credentials by capturing the CredEnumerateA API
Input Capture:Credential API Hooking
Ursnif has hooked APIs to perform a wide variety of information theft, such as monitoring traffic from browsers.
Input Capture:Credential API Hooking
Zebrocy installs an application-defined Windows hook to get notified when a network drive has been attached, so it can then use the hook to call its RecordToFile file stealing method.
Input Capture:Credential API Hooking
Zeus Panda hooks processes by leveraging its own IAT hooked functions.
Input Capture:Credential API Hooking
ZxShell hooks several API functions to spawn system threads.
Screen Capture
Agent Tesla can capture screenshots of the victim’s desktop.
Screen Capture
AppleSeed can take screenshots on a compromised host by calling a series of APIs.
Screen Capture
It has used tools to take screenshots from victims.
Screen Capture
It has used a screen capture utility to take screenshots on a compromised host.
Screen Capture
Aria-body has the ability to capture screenshots on compromised hosts.
Screen Capture
AsyncRAT has the ability to view the screen on compromised hosts.
Screen Capture
Attor's has a plugin that captures screenshots of the target applications.
Screen Capture
Azorult can capture screenshots of the victim’s machines.
Screen Capture
BADHATCH can take screenshots and send them to an actor-controlled C2 server.
Screen Capture
BADNEWS has a command to take a screenshot and send it to the C2 server.
Screen Capture
BadPatch captures screenshots in .jpg format and then exfiltrates them.
Screen Capture
Bandook is capable of taking an image of and uploading the current desktop.
Screen Capture
BISCUIT has a command to periodically take screenshots of the system.
Screen Capture
BlackEnergy is capable of taking screenshots.
Screen Capture
BLUELIGHT has captured a screenshot of the display every 30 seconds for the first 5 minutes after initiating a C2 loop, and then once every five minutes thereafter.
Screen Capture
It has used a tool to capture screenshots.
Screen Capture
Brute Ratel C4 can take screenshots on compromised hosts.
Screen Capture
Cadelspy has the ability to capture screenshots and webcam photos.
Screen Capture
Cannon can take a screenshot of the desktop.
Screen Capture
It performs desktop video recording and captures screenshots of the desktop and sends it to the C2 server.
Screen Capture
Carberp can capture display screenshots with the screens_dll.dll plugin.
Screen Capture
Cardinal RAT can capture screenshots.
Screen Capture
Catchamas captures screenshots based on specific keywords in the window’s title.
Screen Capture
Chaes can capture screenshots of the infected machine.
Screen Capture
CharmPower has the ability to capture screenshots.
Screen Capture
CHOPSTICK has the capability to capture screenshots.
Screen Capture
Chrommme has the ability to capture screenshots.
Screen Capture
Clambling has the ability to capture screenshots.
Screen Capture
Cobalt Strike's Beacon payload is capable of capturing screenshots.
Screen Capture
Cobian RAT has a feature to perform screen capture.
Screen Capture
ConnectWise can take screenshots on remote hosts.
Screen Capture
CosmicDuke takes periodic screenshots and exfiltrates them.
Screen Capture
Crimson contains a command to perform screen captures.
Screen Capture
CrossRAT is capable of taking screen captures.
Screen Capture
It took screenshots using their Windows malware.
Screen Capture
Daserf can take screenshots.
Screen Capture
Derusbi is capable of performing screen captures.
Screen Capture
DOGCALL is capable of capturing screenshots of the victim's machine.
Screen Capture
It has performed screen captures of victims, including by using a tool, scr.exe (which matched the hash of ScreenUtil).
Screen Capture
DustySky captures PNG screenshots of the main screen.
Screen Capture
ECCENTRICBANDWAGON can capture screenshots and store them locally.
Screen Capture
Empire is capable of capturing screenshots on Windows and macOS systems.
Screen Capture
EvilGrab has the capability to capture screenshots.
Screen Capture
It captured screenshots and desktop video recordings.
Screen Capture
FinFisher takes a screenshot of the screen and displays it on top of all other windows for few seconds in an apparent attempt to hide some messages showed by the system during the setup process.
Screen Capture
Flame can take regular screenshots when certain applications are open that are sent to the command and control server.
Screen Capture
FlawedAmmyy can capture screenshots.
Screen Capture
FruitFly takes screenshots of the user's desktop.
Screen Capture
The FunnyDream ScreenCap component can take screenshots on a compromised host.
Screen Capture
It's malware can take screenshots of the compromised computer every minute.
Screen Capture
gh0st RAT can capture the victim’s screen remotely.
Screen Capture
It has used the remote monitoring and management tool ConnectWise to obtain screen captures from victim's machines.
Screen Capture
GRIFFON has used a screenshot module that can be used to take a screenshot of the remote system.
Screen Capture
Malware used by It is capable of watching the victim's screen.
Screen Capture
HALFBAKED can obtain screenshots from the victim.
Screen Capture
HotCroissant has the ability to do real time screen viewing on an infected host.
Screen Capture
Hydraq includes a component based on the code of VNC that can stream a live feed of the desktop of an infected host.
Screen Capture
HyperBro has the ability to take screenshots.
Screen Capture
InvisiMole can capture screenshots of not only the entire screen, but of each separate window open, in case they are overlapping.
Screen Capture
Janicab captured screenshots and sent them out to a C2 server.
Screen Capture
A JHUHUGIT variant takes screenshots by simulating the user pressing the "Take Screenshot" key (VK_SCREENSHOT), accessing the screenshot saved in the clipboard, and converting it to a JPG image.
Screen Capture
jRAT has the capability to take screenshots of the victim’s machine.
Screen Capture
Kasidet has the ability to initiate keylogging and screen captures.
Screen Capture
Kazuar captures screenshots of the victim’s screen.
Screen Capture
KeyBoy has a command to perform screen grabbing.
Screen Capture
KEYMARBLE can capture screenshots of the victim’s machine.
Screen Capture
Kivars has the ability to capture screenshots on the infected host.
Screen Capture
KONNI can take screenshots of the victim’s machine.
Screen Capture
LitePower can take system screenshots and save them to %AppData%.
Screen Capture
Lizar can take JPEG screenshots of an infected system.
Screen Capture
LookBack can take desktop screenshots.
Screen Capture
It captures screenshots.
Screen Capture
MacMa has used Apple’s Core Graphic APIs, such as CGWindowListCreateImageFromArray, to capture the user's screen and open windows.
Screen Capture
MacSpy can capture screenshots of the desktop over multiple monitors.
Screen Capture
Mafalda can take a screenshot of the target machine and save it to a file.
Screen Capture
It malware can take a screenshot and upload the file to its C2 server.
Screen Capture
MarkiRAT can capture screenshots that are initially saved as ‘scr.jpg’.
Screen Capture
Matryoshka is capable of performing screen captures.
Screen Capture
metaMain can take and save screenshots.
Screen Capture
Metamorfo can collect screenshots of the victim’s machine.
Screen Capture
Micropsia takes screenshots every 90 seconds by calling the Gdi32.BitBlt API.
Screen Capture
It has used plugins to take screenshots on targeted systems.
Screen Capture
It has used malware that can capture screenshots of the victim’s machine.
Screen Capture
NETWIRE can capture the victim's screen.
Screen Capture
NightClub can load a module to call CreateCompatibleDC and GdipSaveImageToStream for screen capture.
Screen Capture
njRAT can capture screenshots of the victim’s machines.
Screen Capture
ObliqueRAT can capture a screenshot of the current screen.
Screen Capture
Octopus can capture screenshots of the victims’ machine.
Screen Capture
It has a tool called CANDYKING to capture a screenshot of user's desktop.
Screen Capture
PcShare can take screen shots of a compromised machine.
Screen Capture
Peppy can take screenshots on targeted systems.
Screen Capture
PlugX allows the operator to capture screenshots.