prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Screen Capture | PoetRAT has the ability to take screen captures. |
Screen Capture | POORAIM can perform screen capturing. |
Screen Capture | PowerSploit's Get-TimedScreenshot Exfiltration module can take screenshots at regular intervals. |
Screen Capture | POWERSTATS can retrieve screenshots from compromised hosts. |
Screen Capture | POWRUNER can capture a screenshot from a victim. |
Screen Capture | Prikormka contains a module that captures screenshots of the victim's desktop. |
Screen Capture | Proton captures the content of the desktop with the screencapture binary. |
Screen Capture | Pteranodon can capture screenshots at a configurable interval. |
Screen Capture | Pupy can drop a mouse-logger that will take small screenshots around at each click and then send back to the server. |
Screen Capture | QuietSieve has taken screenshots every five minutes and saved them to the user's local Application Data folder under Temp\SymbolSourceSymbols\icons or Temp\ModeAuto\icons. |
Screen Capture | RainyDay has the ability to capture screenshots. |
Screen Capture | Ramsay can take screenshots every 30 seconds as well as when an external removable storage device is connected. |
Screen Capture | RCSession can capture screenshots from a compromised host. |
Screen Capture | RDAT can take a screenshot on the infected system. |
Screen Capture | RedLeaves can capture screenshots. |
Screen Capture | Remcos takes automated screenshots of the infected machine. |
Screen Capture | Remexi takes screenshots of windows of interest. |
Screen Capture | RemoteUtilities can take screenshots on a compromised host. |
Screen Capture | Revenge RAT has a plugin for screen capture. |
Screen Capture | RogueRobin has a command named $screenshot that may be responsible for taking screenshots of the victim machine. |
Screen Capture | ROKRAT can capture screenshots of the infected system using the gdi32 library. |
Screen Capture | Rover takes screenshots of the compromised system's desktop and saves them to C:\system\screenshot.bmp for exfiltration every 60 minutes. |
Screen Capture | It can capture screenshots. |
Screen Capture | SharpStage has the ability to capture the victim's screen. |
Screen Capture | SHUTTERSPEED can capture screenshots. |
Screen Capture | It can capture victim screen activity. |
Screen Capture | SILENTTRINITY can take a screenshot of the current desktop. |
Screen Capture | Sliver can take screenshots of the victim’s active display. |
Screen Capture | SLOTHFULMEDIA has taken a screenshot of a victim's desktop, named it "Filter3.jpg", and stored it in the local directory. |
Screen Capture | SMOKEDHAM can capture screenshots of the victim’s desktop. |
Screen Capture | Socksbot can take screenshots. |
Screen Capture | StoneDrill can take screenshots. |
Screen Capture | StrifeWater has the ability to take screen captures. |
Screen Capture | SVCReady can take a screenshot from an infected host. |
Screen Capture | SysUpdate has the ability to capture screenshots. |
Screen Capture | T9000 can take screenshots of the desktop and target application windows, saving them to user directories as one byte XOR encrypted .dat files. |
Screen Capture | TajMahal has the ability to take screenshots on an infected host including capturing content from windows of instant messaging applications. |
Screen Capture | TinyZBot contains screen capture functionality. |
Screen Capture | Trojan.Karagany can take a desktop screenshot and save the file into \ProgramData\Mail\MailAg\shot.png. |
Screen Capture | Turian has the ability to take screenshots. |
Screen Capture | TURNEDUP is capable of taking screenshots. |
Screen Capture | UPPERCUT can capture desktop screenshots in the PNG format and send them to the C2 server. |
Screen Capture | Ursnif has used hooked APIs to take screenshots. |
Screen Capture | Valak has the ability to take screenshots on a compromised host. |
Screen Capture | VERMIN can perform screen captures of the victim’s machine. |
Screen Capture | Woody RAT has the ability to take a screenshot of the infected host desktop using Windows GDI+. |
Screen Capture | XAgentOSX contains the takeScreenShot (along with startTakeScreenShot and stopTakeScreenShot) functions to take screenshots using the CGGetActiveDisplayList, CGDisplayCreateImage, and NSImage:initWithCGImage methods. |
Screen Capture | XCSSET saves a screen capture of the victim's system with a numbered filename and .jpg extension. Screen captures are taken at specified intervals based on the system. |
Screen Capture | yty collects screenshots of the victim machine. |
Screen Capture | A variant of Zebrocy captures screenshots of the victim’s machine in JPEG and BMP format. |
Screen Capture | Zeus Panda can take screenshots of the victim’s machine. |
Screen Capture | ZLib has the ability to obtain screenshots of the compromised system. |
Screen Capture | ZxShell can capture screenshots. |
Video Capture | Agent Tesla can access the victim’s webcam and record video. |
Video Capture | AsyncRAT can record screen content on targeted systems. |
Video Capture | Bandook has modules that are capable of capturing video from a victim's webcam. |
Video Capture | Clambling can record screen content in AVI format. |
Video Capture | Cobian RAT has a feature to access the webcam on the victim’s machine. |
Video Capture | ConnectWise can record video on remote hosts. |
Video Capture | Crimson can capture webcam video on targeted systems. |
Video Capture | DarkComet can access the victim’s webcam to take pictures. |
Video Capture | Derusbi is capable of capturing video. |
Video Capture | Empire can capture webcam data on Windows and macOS systems. |
Video Capture | EvilGrab has the capability to capture video from a victim machine. |
Video Capture | It created a custom video recording capability that could be used to monitor operations in the victim's environment. |
Video Capture | Imminent Monitor has a remote webcam monitoring capability. |
Video Capture | InvisiMole can remotely activate the victim’s webcam to capture content. |
Video Capture | jRAT has the capability to capture video from a webcam. |
Video Capture | Kazuar captures images from the webcam. |
Video Capture | It takes photos from the computer’s web camera. |
Video Capture | NanoCore can access the victim's webcam and capture data. |
Video Capture | njRAT can access the victim's webcam. |
Video Capture | ObliqueRAT can capture images from webcams on compromised hosts. |
Video Capture | PcShare can capture camera video as part of its collection process. |
Video Capture | PoetRAT has used a Python tool named Bewmac to record the webcam on compromised hosts. |
Video Capture | Pupy can access a connected webcam and capture pictures. |
Video Capture | QuasarRAT can perform webcam viewing. |
Video Capture | Remcos can access a system’s webcam and take pictures. |
Video Capture | Revenge RAT has the ability to access the webcam. |
Video Capture | SDBbot has the ability to record video on a compromised host. |
Video Capture | It has been observed making videos of victims to observe bank employees day to day activities. |
Video Capture | T9000 uses the Skype API to record audio and video calls. It writes encrypted data to %APPDATA%\Intel\Skype. |
Video Capture | TajMahal has the ability to capture webcam video. |
Video Capture | WarzoneRAT can access the webcam on a victim's machine. |
Video Capture | ZxShell has a command to perform video device spying. |
Application Layer Protocol | Clambling has the ability to use Telnet for communication. |
Application Layer Protocol | Duqu uses a custom command and control protocol that communicates over commonly used ports, and is frequently encapsulated by application layer protocols. |
Application Layer Protocol | Hildegard has used an IRC channel for C2 communications. |
Application Layer Protocol | Lucifer can use the Stratum protocol on port 10001 for communication between the cryptojacking bot and the mining server. |
Application Layer Protocol | It malware has used IRC for C2. |
Application Layer Protocol | Adversaries can also use NETEAGLE to establish an RDP connection with a controller over TCP/7519. |
Application Layer Protocol | QUIETEXIT can use an inverse negotiated SSH connection as part of its C2. |
Application Layer Protocol | It issued wget requests from infected systems to the C2. |
Application Layer Protocol | Siloscape connects to an IRC server for C2. |
Application Layer Protocol | It has used an IRC bot for C2 communications. |
Application Layer Protocol:Web Protocols | During the 2015 Ukraine Electric Power Attack, It used BlackEnergy to communicate between compromised hosts and their command-and-control servers via HTTP post requests. |
Application Layer Protocol:Web Protocols | 3PARA RAT uses HTTP for command and control. |
Application Layer Protocol:Web Protocols | 4H RAT uses HTTP for command and control. |
Application Layer Protocol:Web Protocols | ABK has the ability to use HTTP in communications with C2. |
Application Layer Protocol:Web Protocols | Action RAT can use HTTP to communicate with C2 servers. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.