prompt
stringclasses
508 values
procedure
stringlengths
20
478
Screen Capture
PoetRAT has the ability to take screen captures.
Screen Capture
POORAIM can perform screen capturing.
Screen Capture
PowerSploit's Get-TimedScreenshot Exfiltration module can take screenshots at regular intervals.
Screen Capture
POWERSTATS can retrieve screenshots from compromised hosts.
Screen Capture
POWRUNER can capture a screenshot from a victim.
Screen Capture
Prikormka contains a module that captures screenshots of the victim's desktop.
Screen Capture
Proton captures the content of the desktop with the screencapture binary.
Screen Capture
Pteranodon can capture screenshots at a configurable interval.
Screen Capture
Pupy can drop a mouse-logger that will take small screenshots around at each click and then send back to the server.
Screen Capture
QuietSieve has taken screenshots every five minutes and saved them to the user's local Application Data folder under Temp\SymbolSourceSymbols\icons or Temp\ModeAuto\icons.
Screen Capture
RainyDay has the ability to capture screenshots.
Screen Capture
Ramsay can take screenshots every 30 seconds as well as when an external removable storage device is connected.
Screen Capture
RCSession can capture screenshots from a compromised host.
Screen Capture
RDAT can take a screenshot on the infected system.
Screen Capture
RedLeaves can capture screenshots.
Screen Capture
Remcos takes automated screenshots of the infected machine.
Screen Capture
Remexi takes screenshots of windows of interest.
Screen Capture
RemoteUtilities can take screenshots on a compromised host.
Screen Capture
Revenge RAT has a plugin for screen capture.
Screen Capture
RogueRobin has a command named $screenshot that may be responsible for taking screenshots of the victim machine.
Screen Capture
ROKRAT can capture screenshots of the infected system using the gdi32 library.
Screen Capture
Rover takes screenshots of the compromised system's desktop and saves them to C:\system\screenshot.bmp for exfiltration every 60 minutes.
Screen Capture
It can capture screenshots.
Screen Capture
SharpStage has the ability to capture the victim's screen.
Screen Capture
SHUTTERSPEED can capture screenshots.
Screen Capture
It can capture victim screen activity.
Screen Capture
SILENTTRINITY can take a screenshot of the current desktop.
Screen Capture
Sliver can take screenshots of the victim’s active display.
Screen Capture
SLOTHFULMEDIA has taken a screenshot of a victim's desktop, named it "Filter3.jpg", and stored it in the local directory.
Screen Capture
SMOKEDHAM can capture screenshots of the victim’s desktop.
Screen Capture
Socksbot can take screenshots.
Screen Capture
StoneDrill can take screenshots.
Screen Capture
StrifeWater has the ability to take screen captures.
Screen Capture
SVCReady can take a screenshot from an infected host.
Screen Capture
SysUpdate has the ability to capture screenshots.
Screen Capture
T9000 can take screenshots of the desktop and target application windows, saving them to user directories as one byte XOR encrypted .dat files.
Screen Capture
TajMahal has the ability to take screenshots on an infected host including capturing content from windows of instant messaging applications.
Screen Capture
TinyZBot contains screen capture functionality.
Screen Capture
Trojan.Karagany can take a desktop screenshot and save the file into \ProgramData\Mail\MailAg\shot.png.
Screen Capture
Turian has the ability to take screenshots.
Screen Capture
TURNEDUP is capable of taking screenshots.
Screen Capture
UPPERCUT can capture desktop screenshots in the PNG format and send them to the C2 server.
Screen Capture
Ursnif has used hooked APIs to take screenshots.
Screen Capture
Valak has the ability to take screenshots on a compromised host.
Screen Capture
VERMIN can perform screen captures of the victim’s machine.
Screen Capture
Woody RAT has the ability to take a screenshot of the infected host desktop using Windows GDI+.
Screen Capture
XAgentOSX contains the takeScreenShot (along with startTakeScreenShot and stopTakeScreenShot) functions to take screenshots using the CGGetActiveDisplayList, CGDisplayCreateImage, and NSImage:initWithCGImage methods.
Screen Capture
XCSSET saves a screen capture of the victim's system with a numbered filename and .jpg extension. Screen captures are taken at specified intervals based on the system.
Screen Capture
yty collects screenshots of the victim machine.
Screen Capture
A variant of Zebrocy captures screenshots of the victim’s machine in JPEG and BMP format.
Screen Capture
Zeus Panda can take screenshots of the victim’s machine.
Screen Capture
ZLib has the ability to obtain screenshots of the compromised system.
Screen Capture
ZxShell can capture screenshots.
Video Capture
Agent Tesla can access the victim’s webcam and record video.
Video Capture
AsyncRAT can record screen content on targeted systems.
Video Capture
Bandook has modules that are capable of capturing video from a victim's webcam.
Video Capture
Clambling can record screen content in AVI format.
Video Capture
Cobian RAT has a feature to access the webcam on the victim’s machine.
Video Capture
ConnectWise can record video on remote hosts.
Video Capture
Crimson can capture webcam video on targeted systems.
Video Capture
DarkComet can access the victim’s webcam to take pictures.
Video Capture
Derusbi is capable of capturing video.
Video Capture
Empire can capture webcam data on Windows and macOS systems.
Video Capture
EvilGrab has the capability to capture video from a victim machine.
Video Capture
It created a custom video recording capability that could be used to monitor operations in the victim's environment.
Video Capture
Imminent Monitor has a remote webcam monitoring capability.
Video Capture
InvisiMole can remotely activate the victim’s webcam to capture content.
Video Capture
jRAT has the capability to capture video from a webcam.
Video Capture
Kazuar captures images from the webcam.
Video Capture
It takes photos from the computer’s web camera.
Video Capture
NanoCore can access the victim's webcam and capture data.
Video Capture
njRAT can access the victim's webcam.
Video Capture
ObliqueRAT can capture images from webcams on compromised hosts.
Video Capture
PcShare can capture camera video as part of its collection process.
Video Capture
PoetRAT has used a Python tool named Bewmac to record the webcam on compromised hosts.
Video Capture
Pupy can access a connected webcam and capture pictures.
Video Capture
QuasarRAT can perform webcam viewing.
Video Capture
Remcos can access a system’s webcam and take pictures.
Video Capture
Revenge RAT has the ability to access the webcam.
Video Capture
SDBbot has the ability to record video on a compromised host.
Video Capture
It has been observed making videos of victims to observe bank employees day to day activities.
Video Capture
T9000 uses the Skype API to record audio and video calls. It writes encrypted data to %APPDATA%\Intel\Skype.
Video Capture
TajMahal has the ability to capture webcam video.
Video Capture
WarzoneRAT can access the webcam on a victim's machine.
Video Capture
ZxShell has a command to perform video device spying.
Application Layer Protocol
Clambling has the ability to use Telnet for communication.
Application Layer Protocol
Duqu uses a custom command and control protocol that communicates over commonly used ports, and is frequently encapsulated by application layer protocols.
Application Layer Protocol
Hildegard has used an IRC channel for C2 communications.
Application Layer Protocol
Lucifer can use the Stratum protocol on port 10001 for communication between the cryptojacking bot and the mining server.
Application Layer Protocol
It malware has used IRC for C2.
Application Layer Protocol
Adversaries can also use NETEAGLE to establish an RDP connection with a controller over TCP/7519.
Application Layer Protocol
QUIETEXIT can use an inverse negotiated SSH connection as part of its C2.
Application Layer Protocol
It issued wget requests from infected systems to the C2.
Application Layer Protocol
Siloscape connects to an IRC server for C2.
Application Layer Protocol
It has used an IRC bot for C2 communications.
Application Layer Protocol:Web Protocols
During the 2015 Ukraine Electric Power Attack, It used BlackEnergy to communicate between compromised hosts and their command-and-control servers via HTTP post requests.
Application Layer Protocol:Web Protocols
3PARA RAT uses HTTP for command and control.
Application Layer Protocol:Web Protocols
4H RAT uses HTTP for command and control.
Application Layer Protocol:Web Protocols
ABK has the ability to use HTTP in communications with C2.
Application Layer Protocol:Web Protocols
Action RAT can use HTTP to communicate with C2 servers.