prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Input Capture:Credential API Hooking | NOKKI uses the Windows call SetWindowsHookEx and begins injecting it into every GUI process running on the victim's machine. |
Input Capture:Credential API Hooking | It is capable of using Windows hook interfaces for information gathering such as credential access. |
Input Capture:Credential API Hooking | RDFSNIFFER hooks several Win32 API functions to hijack elements of the remote system management user-interface. |
Input Capture:Credential API Hooking | TrickBot has the ability to capture RDP credentials by capturing the CredEnumerateA API |
Input Capture:Credential API Hooking | Ursnif has hooked APIs to perform a wide variety of information theft, such as monitoring traffic from browsers. |
Input Capture:Credential API Hooking | Zebrocy installs an application-defined Windows hook to get notified when a network drive has been attached, so it can then use the hook to call its RecordToFile file stealing method. |
Input Capture:Credential API Hooking | Zeus Panda hooks processes by leveraging its own IAT hooked functions. |
Input Capture:Credential API Hooking | ZxShell hooks several API functions to spawn system threads. |
Screen Capture | Agent Tesla can capture screenshots of the victim’s desktop. |
Screen Capture | AppleSeed can take screenshots on a compromised host by calling a series of APIs. |
Screen Capture | It has used tools to take screenshots from victims. |
Screen Capture | It has used a screen capture utility to take screenshots on a compromised host. |
Screen Capture | Aria-body has the ability to capture screenshots on compromised hosts. |
Screen Capture | AsyncRAT has the ability to view the screen on compromised hosts. |
Screen Capture | Attor's has a plugin that captures screenshots of the target applications. |
Screen Capture | Azorult can capture screenshots of the victim’s machines. |
Screen Capture | BADHATCH can take screenshots and send them to an actor-controlled C2 server. |
Screen Capture | BADNEWS has a command to take a screenshot and send it to the C2 server. |
Screen Capture | BadPatch captures screenshots in .jpg format and then exfiltrates them. |
Screen Capture | Bandook is capable of taking an image of and uploading the current desktop. |
Screen Capture | BISCUIT has a command to periodically take screenshots of the system. |
Screen Capture | BlackEnergy is capable of taking screenshots. |
Screen Capture | BLUELIGHT has captured a screenshot of the display every 30 seconds for the first 5 minutes after initiating a C2 loop, and then once every five minutes thereafter. |
Screen Capture | It has used a tool to capture screenshots. |
Screen Capture | Brute Ratel C4 can take screenshots on compromised hosts. |
Screen Capture | Cadelspy has the ability to capture screenshots and webcam photos. |
Screen Capture | Cannon can take a screenshot of the desktop. |
Screen Capture | It performs desktop video recording and captures screenshots of the desktop and sends it to the C2 server. |
Screen Capture | Carberp can capture display screenshots with the screens_dll.dll plugin. |
Screen Capture | Cardinal RAT can capture screenshots. |
Screen Capture | Catchamas captures screenshots based on specific keywords in the window’s title. |
Screen Capture | Chaes can capture screenshots of the infected machine. |
Screen Capture | CharmPower has the ability to capture screenshots. |
Screen Capture | CHOPSTICK has the capability to capture screenshots. |
Screen Capture | Chrommme has the ability to capture screenshots. |
Screen Capture | Clambling has the ability to capture screenshots. |
Screen Capture | Cobalt Strike's Beacon payload is capable of capturing screenshots. |
Screen Capture | Cobian RAT has a feature to perform screen capture. |
Screen Capture | ConnectWise can take screenshots on remote hosts. |
Screen Capture | CosmicDuke takes periodic screenshots and exfiltrates them. |
Screen Capture | Crimson contains a command to perform screen captures. |
Screen Capture | CrossRAT is capable of taking screen captures. |
Screen Capture | It took screenshots using their Windows malware. |
Screen Capture | Daserf can take screenshots. |
Screen Capture | Derusbi is capable of performing screen captures. |
Screen Capture | DOGCALL is capable of capturing screenshots of the victim's machine. |
Screen Capture | It has performed screen captures of victims, including by using a tool, scr.exe (which matched the hash of ScreenUtil). |
Screen Capture | DustySky captures PNG screenshots of the main screen. |
Screen Capture | ECCENTRICBANDWAGON can capture screenshots and store them locally. |
Screen Capture | Empire is capable of capturing screenshots on Windows and macOS systems. |
Screen Capture | EvilGrab has the capability to capture screenshots. |
Screen Capture | It captured screenshots and desktop video recordings. |
Screen Capture | FinFisher takes a screenshot of the screen and displays it on top of all other windows for few seconds in an apparent attempt to hide some messages showed by the system during the setup process. |
Screen Capture | Flame can take regular screenshots when certain applications are open that are sent to the command and control server. |
Screen Capture | FlawedAmmyy can capture screenshots. |
Screen Capture | FruitFly takes screenshots of the user's desktop. |
Screen Capture | The FunnyDream ScreenCap component can take screenshots on a compromised host. |
Screen Capture | It's malware can take screenshots of the compromised computer every minute. |
Screen Capture | gh0st RAT can capture the victim’s screen remotely. |
Screen Capture | It has used the remote monitoring and management tool ConnectWise to obtain screen captures from victim's machines. |
Screen Capture | GRIFFON has used a screenshot module that can be used to take a screenshot of the remote system. |
Screen Capture | Malware used by It is capable of watching the victim's screen. |
Screen Capture | HALFBAKED can obtain screenshots from the victim. |
Screen Capture | HotCroissant has the ability to do real time screen viewing on an infected host. |
Screen Capture | Hydraq includes a component based on the code of VNC that can stream a live feed of the desktop of an infected host. |
Screen Capture | HyperBro has the ability to take screenshots. |
Screen Capture | InvisiMole can capture screenshots of not only the entire screen, but of each separate window open, in case they are overlapping. |
Screen Capture | Janicab captured screenshots and sent them out to a C2 server. |
Screen Capture | A JHUHUGIT variant takes screenshots by simulating the user pressing the "Take Screenshot" key (VK_SCREENSHOT), accessing the screenshot saved in the clipboard, and converting it to a JPG image. |
Screen Capture | jRAT has the capability to take screenshots of the victim’s machine. |
Screen Capture | Kasidet has the ability to initiate keylogging and screen captures. |
Screen Capture | Kazuar captures screenshots of the victim’s screen. |
Screen Capture | KeyBoy has a command to perform screen grabbing. |
Screen Capture | KEYMARBLE can capture screenshots of the victim’s machine. |
Screen Capture | Kivars has the ability to capture screenshots on the infected host. |
Screen Capture | KONNI can take screenshots of the victim’s machine. |
Screen Capture | LitePower can take system screenshots and save them to %AppData%. |
Screen Capture | Lizar can take JPEG screenshots of an infected system. |
Screen Capture | LookBack can take desktop screenshots. |
Screen Capture | It captures screenshots. |
Screen Capture | MacMa has used Apple’s Core Graphic APIs, such as CGWindowListCreateImageFromArray, to capture the user's screen and open windows. |
Screen Capture | MacSpy can capture screenshots of the desktop over multiple monitors. |
Screen Capture | Mafalda can take a screenshot of the target machine and save it to a file. |
Screen Capture | It malware can take a screenshot and upload the file to its C2 server. |
Screen Capture | MarkiRAT can capture screenshots that are initially saved as ‘scr.jpg’. |
Screen Capture | Matryoshka is capable of performing screen captures. |
Screen Capture | metaMain can take and save screenshots. |
Screen Capture | Metamorfo can collect screenshots of the victim’s machine. |
Screen Capture | Micropsia takes screenshots every 90 seconds by calling the Gdi32.BitBlt API. |
Screen Capture | It has used plugins to take screenshots on targeted systems. |
Screen Capture | It has used malware that can capture screenshots of the victim’s machine. |
Screen Capture | NETWIRE can capture the victim's screen. |
Screen Capture | NightClub can load a module to call CreateCompatibleDC and GdipSaveImageToStream for screen capture. |
Screen Capture | njRAT can capture screenshots of the victim’s machines. |
Screen Capture | ObliqueRAT can capture a screenshot of the current screen. |
Screen Capture | Octopus can capture screenshots of the victims’ machine. |
Screen Capture | It has a tool called CANDYKING to capture a screenshot of user's desktop. |
Screen Capture | PcShare can take screen shots of a compromised machine. |
Screen Capture | Peppy can take screenshots on targeted systems. |
Screen Capture | PlugX allows the operator to capture screenshots. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.