prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Screen Capture
|
PoetRAT has the ability to take screen captures.
|
Screen Capture
|
POORAIM can perform screen capturing.
|
Screen Capture
|
PowerSploit's Get-TimedScreenshot Exfiltration module can take screenshots at regular intervals.
|
Screen Capture
|
POWERSTATS can retrieve screenshots from compromised hosts.
|
Screen Capture
|
POWRUNER can capture a screenshot from a victim.
|
Screen Capture
|
Prikormka contains a module that captures screenshots of the victim's desktop.
|
Screen Capture
|
Proton captures the content of the desktop with the screencapture binary.
|
Screen Capture
|
Pteranodon can capture screenshots at a configurable interval.
|
Screen Capture
|
Pupy can drop a mouse-logger that will take small screenshots around at each click and then send back to the server.
|
Screen Capture
|
QuietSieve has taken screenshots every five minutes and saved them to the user's local Application Data folder under Temp\SymbolSourceSymbols\icons or Temp\ModeAuto\icons.
|
Screen Capture
|
RainyDay has the ability to capture screenshots.
|
Screen Capture
|
Ramsay can take screenshots every 30 seconds as well as when an external removable storage device is connected.
|
Screen Capture
|
RCSession can capture screenshots from a compromised host.
|
Screen Capture
|
RDAT can take a screenshot on the infected system.
|
Screen Capture
|
RedLeaves can capture screenshots.
|
Screen Capture
|
Remcos takes automated screenshots of the infected machine.
|
Screen Capture
|
Remexi takes screenshots of windows of interest.
|
Screen Capture
|
RemoteUtilities can take screenshots on a compromised host.
|
Screen Capture
|
Revenge RAT has a plugin for screen capture.
|
Screen Capture
|
RogueRobin has a command named $screenshot that may be responsible for taking screenshots of the victim machine.
|
Screen Capture
|
ROKRAT can capture screenshots of the infected system using the gdi32 library.
|
Screen Capture
|
Rover takes screenshots of the compromised system's desktop and saves them to C:\system\screenshot.bmp for exfiltration every 60 minutes.
|
Screen Capture
|
It can capture screenshots.
|
Screen Capture
|
SharpStage has the ability to capture the victim's screen.
|
Screen Capture
|
SHUTTERSPEED can capture screenshots.
|
Screen Capture
|
It can capture victim screen activity.
|
Screen Capture
|
SILENTTRINITY can take a screenshot of the current desktop.
|
Screen Capture
|
Sliver can take screenshots of the victim’s active display.
|
Screen Capture
|
SLOTHFULMEDIA has taken a screenshot of a victim's desktop, named it "Filter3.jpg", and stored it in the local directory.
|
Screen Capture
|
SMOKEDHAM can capture screenshots of the victim’s desktop.
|
Screen Capture
|
Socksbot can take screenshots.
|
Screen Capture
|
StoneDrill can take screenshots.
|
Screen Capture
|
StrifeWater has the ability to take screen captures.
|
Screen Capture
|
SVCReady can take a screenshot from an infected host.
|
Screen Capture
|
SysUpdate has the ability to capture screenshots.
|
Screen Capture
|
T9000 can take screenshots of the desktop and target application windows, saving them to user directories as one byte XOR encrypted .dat files.
|
Screen Capture
|
TajMahal has the ability to take screenshots on an infected host including capturing content from windows of instant messaging applications.
|
Screen Capture
|
TinyZBot contains screen capture functionality.
|
Screen Capture
|
Trojan.Karagany can take a desktop screenshot and save the file into \ProgramData\Mail\MailAg\shot.png.
|
Screen Capture
|
Turian has the ability to take screenshots.
|
Screen Capture
|
TURNEDUP is capable of taking screenshots.
|
Screen Capture
|
UPPERCUT can capture desktop screenshots in the PNG format and send them to the C2 server.
|
Screen Capture
|
Ursnif has used hooked APIs to take screenshots.
|
Screen Capture
|
Valak has the ability to take screenshots on a compromised host.
|
Screen Capture
|
VERMIN can perform screen captures of the victim’s machine.
|
Screen Capture
|
Woody RAT has the ability to take a screenshot of the infected host desktop using Windows GDI+.
|
Screen Capture
|
XAgentOSX contains the takeScreenShot (along with startTakeScreenShot and stopTakeScreenShot) functions to take screenshots using the CGGetActiveDisplayList, CGDisplayCreateImage, and NSImage:initWithCGImage methods.
|
Screen Capture
|
XCSSET saves a screen capture of the victim's system with a numbered filename and .jpg extension. Screen captures are taken at specified intervals based on the system.
|
Screen Capture
|
yty collects screenshots of the victim machine.
|
Screen Capture
|
A variant of Zebrocy captures screenshots of the victim’s machine in JPEG and BMP format.
|
Screen Capture
|
Zeus Panda can take screenshots of the victim’s machine.
|
Screen Capture
|
ZLib has the ability to obtain screenshots of the compromised system.
|
Screen Capture
|
ZxShell can capture screenshots.
|
Video Capture
|
Agent Tesla can access the victim’s webcam and record video.
|
Video Capture
|
AsyncRAT can record screen content on targeted systems.
|
Video Capture
|
Bandook has modules that are capable of capturing video from a victim's webcam.
|
Video Capture
|
Clambling can record screen content in AVI format.
|
Video Capture
|
Cobian RAT has a feature to access the webcam on the victim’s machine.
|
Video Capture
|
ConnectWise can record video on remote hosts.
|
Video Capture
|
Crimson can capture webcam video on targeted systems.
|
Video Capture
|
DarkComet can access the victim’s webcam to take pictures.
|
Video Capture
|
Derusbi is capable of capturing video.
|
Video Capture
|
Empire can capture webcam data on Windows and macOS systems.
|
Video Capture
|
EvilGrab has the capability to capture video from a victim machine.
|
Video Capture
|
It created a custom video recording capability that could be used to monitor operations in the victim's environment.
|
Video Capture
|
Imminent Monitor has a remote webcam monitoring capability.
|
Video Capture
|
InvisiMole can remotely activate the victim’s webcam to capture content.
|
Video Capture
|
jRAT has the capability to capture video from a webcam.
|
Video Capture
|
Kazuar captures images from the webcam.
|
Video Capture
|
It takes photos from the computer’s web camera.
|
Video Capture
|
NanoCore can access the victim's webcam and capture data.
|
Video Capture
|
njRAT can access the victim's webcam.
|
Video Capture
|
ObliqueRAT can capture images from webcams on compromised hosts.
|
Video Capture
|
PcShare can capture camera video as part of its collection process.
|
Video Capture
|
PoetRAT has used a Python tool named Bewmac to record the webcam on compromised hosts.
|
Video Capture
|
Pupy can access a connected webcam and capture pictures.
|
Video Capture
|
QuasarRAT can perform webcam viewing.
|
Video Capture
|
Remcos can access a system’s webcam and take pictures.
|
Video Capture
|
Revenge RAT has the ability to access the webcam.
|
Video Capture
|
SDBbot has the ability to record video on a compromised host.
|
Video Capture
|
It has been observed making videos of victims to observe bank employees day to day activities.
|
Video Capture
|
T9000 uses the Skype API to record audio and video calls. It writes encrypted data to %APPDATA%\Intel\Skype.
|
Video Capture
|
TajMahal has the ability to capture webcam video.
|
Video Capture
|
WarzoneRAT can access the webcam on a victim's machine.
|
Video Capture
|
ZxShell has a command to perform video device spying.
|
Application Layer Protocol
|
Clambling has the ability to use Telnet for communication.
|
Application Layer Protocol
|
Duqu uses a custom command and control protocol that communicates over commonly used ports, and is frequently encapsulated by application layer protocols.
|
Application Layer Protocol
|
Hildegard has used an IRC channel for C2 communications.
|
Application Layer Protocol
|
Lucifer can use the Stratum protocol on port 10001 for communication between the cryptojacking bot and the mining server.
|
Application Layer Protocol
|
It malware has used IRC for C2.
|
Application Layer Protocol
|
Adversaries can also use NETEAGLE to establish an RDP connection with a controller over TCP/7519.
|
Application Layer Protocol
|
QUIETEXIT can use an inverse negotiated SSH connection as part of its C2.
|
Application Layer Protocol
|
It issued wget requests from infected systems to the C2.
|
Application Layer Protocol
|
Siloscape connects to an IRC server for C2.
|
Application Layer Protocol
|
It has used an IRC bot for C2 communications.
|
Application Layer Protocol:Web Protocols
|
During the 2015 Ukraine Electric Power Attack, It used BlackEnergy to communicate between compromised hosts and their command-and-control servers via HTTP post requests.
|
Application Layer Protocol:Web Protocols
|
3PARA RAT uses HTTP for command and control.
|
Application Layer Protocol:Web Protocols
|
4H RAT uses HTTP for command and control.
|
Application Layer Protocol:Web Protocols
|
ABK has the ability to use HTTP in communications with C2.
|
Application Layer Protocol:Web Protocols
|
Action RAT can use HTTP to communicate with C2 servers.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.