prompt
stringclasses
508 values
procedure
stringlengths
20
478
Input Capture:Keylogging
It has used a keylogging tool that records keystrokes in encrypted files.
Input Capture:Keylogging
It has abused the PasswordChangeNotify to monitor for and capture account password changes.
Input Capture:Keylogging
It used a Trojan called KEYLIME to capture keystrokes from the victim’s machine.
Input Capture:Keylogging
It has used tools for capturing keystrokes.
Input Capture:Keylogging
It used a keylogger called GEARSHIFT on a target system.
Input Capture:Keylogging
Astaroth logs keystrokes from the victim's machine.
Input Capture:Keylogging
AsyncRAT can capture keystrokes on the victim’s machine.
Input Capture:Keylogging
One of Attor's plugins can collect user credentials via capturing keystrokes and can capture keystrokes pressed within the window of the injected process.
Input Capture:Keylogging
BabyShark has a PowerShell-based remote administration ability that can implement a PowerShell or C# based keylogger.
Input Capture:Keylogging
When it first starts, BADNEWS spawns a new thread to log keystrokes.
Input Capture:Keylogging
BadPatch has a keylogging capability.
Input Capture:Keylogging
Bandook contains keylogging capabilities.
Input Capture:Keylogging
BISCUIT can capture keystrokes.
Input Capture:Keylogging
BlackEnergy has run a keylogger plug-in on a victim.
Input Capture:Keylogging
Cadelspy has the ability to log keystrokes on the compromised host.
Input Capture:Keylogging
It logs key strokes for configured processes and sends them back to the C2 server.
Input Capture:Keylogging
Cardinal RAT can log keystrokes.
Input Capture:Keylogging
Catchamas collects keystrokes from the victim’s machine.
Input Capture:Keylogging
CHOPSTICK is capable of performing keylogging.
Input Capture:Keylogging
Clambling can capture keystrokes on a compromised host.
Input Capture:Keylogging
Cobalt Strike can track key presses with a keylogger module.
Input Capture:Keylogging
Cobian RAT has a feature to perform keylogging on the victim’s machine.
Input Capture:Keylogging
CosmicDuke uses a keylogger.
Input Capture:Keylogging
Crimson can use a module to perform keylogging on compromised hosts.
Input Capture:Keylogging
Cuba logs keystrokes via polling by using GetKeyState and VkKeyScan functions.
Input Capture:Keylogging
DarkComet has a keylogging capability.
Input Capture:Keylogging
It has used a keylogger.
Input Capture:Keylogging
DarkTortilla can download a keylogging module.
Input Capture:Keylogging
DarkWatchman can track key presses with a keylogger module.
Input Capture:Keylogging
Daserf can log keystrokes.
Input Capture:Keylogging
Derusbi is capable of logging keystrokes.
Input Capture:Keylogging
DOGCALL is capable of logging keystrokes.
Input Capture:Keylogging
Dtrack’s dropper contains a keylogging executable.
Input Capture:Keylogging
Duqu can track key presses with a keylogger module.
Input Capture:Keylogging
DustySky contains a keylogger.
Input Capture:Keylogging
ECCENTRICBANDWAGON can capture and store keystrokes.
Input Capture:Keylogging
Empire includes keylogging capabilities for Windows, Linux, and macOS systems.
Input Capture:Keylogging
EvilGrab has the capability to capture keystrokes.
Input Capture:Keylogging
Explosive has leveraged its keylogging capabilities to gain access to administrator accounts on target servers.
Input Capture:Keylogging
FakeM contains a keylogger module.
Input Capture:Keylogging
It has logged the keystrokes of victims to escalate privileges.
Input Capture:Keylogging
It has captured credentials via fake Outlook Web App (OWA) login pages and has also used a .NET based keylogger.
Input Capture:Keylogging
FlawedAmmyy can collect keyboard events.
Input Capture:Keylogging
The FunnyDream Keyrecord component can capture keystrokes.
Input Capture:Keylogging
Fysbis can perform keylogging.
Input Capture:Keylogging
gh0st RAT has a keylogger.
Input Capture:Keylogging
Grandoreiro can log keystrokes on the victim's machine.
Input Capture:Keylogging
GreyEnergy has a module to harvest pressed keystrokes.
Input Capture:Keylogging
Malware used by It is capable of capturing keystrokes.
Input Capture:Keylogging
The executable version of Helminth has a module to log keystrokes.
Input Capture:Keylogging
It has used a PowerShell-based keylogger named kl.ps1.
Input Capture:Keylogging
HTTPBrowser is capable of capturing keystrokes on victims.
Input Capture:Keylogging
Imminent Monitor has a keylogging module.
Input Capture:Keylogging
InvisiMole can capture keystrokes on a compromised host.
Input Capture:Keylogging
JPIN contains a custom keylogger.
Input Capture:Keylogging
jRAT has the capability to log keystrokes from the victim’s machine, both offline and online.
Input Capture:Keylogging
Kasidet has the ability to initiate keylogging.
Input Capture:Keylogging
It has used keyloggers.
Input Capture:Keylogging
KeyBoy installs a keylogger for intercepting credentials and keystrokes.
Input Capture:Keylogging
KGH_SPY can perform keylogging by polling the GetAsyncKeyState() function.
Input Capture:Keylogging
It has used a PowerShell-based keylogger as well as a tool called MECHANICAL to log keystrokes.
Input Capture:Keylogging
Kivars has the ability to initiate keylogging on the infected host.
Input Capture:Keylogging
KONNI has the capability to perform keylogging.
Input Capture:Keylogging
It malware KiloAlfa contains keylogging functionality.
Input Capture:Keylogging
Lokibot has the ability to capture input on the compromised host via keylogging.
Input Capture:Keylogging
It logs keystrokes from the victim’s machine.
Input Capture:Keylogging
MacMa can use Core Graphics Event Taps to intercept user keystrokes from any text input field and saves them to text files. Text input fields include Spotlight, Finder, Safari, Mail, Messages, and other apps that have text fields for passwords.
Input Capture:Keylogging
MacSpy captures keystrokes.
Input Capture:Keylogging
It malware is capable of keylogging.
Input Capture:Keylogging
MarkiRAT can capture all keystrokes on a compromised host.
Input Capture:Keylogging
Matryoshka is capable of keylogging.
Input Capture:Keylogging
It has used key loggers to steal usernames and passwords.
Input Capture:Keylogging
metaMain has the ability to log keyboard events.
Input Capture:Keylogging
Metamorfo has a command to launch a keylogger and capture keystrokes on the victim’s machine.
Input Capture:Keylogging
Micropsia has keylogging capabilities.
Input Capture:Keylogging
MoonWind has a keylogger.
Input Capture:Keylogging
NanoCore can perform keylogging on the victim’s machine.
Input Capture:Keylogging
NavRAT logs the keystrokes on the targeted system.
Input Capture:Keylogging
NetTraveler contains a keylogger.
Input Capture:Keylogging
NETWIRE can perform keylogging.
Input Capture:Keylogging
NightClub can use a plugin for keylogging.
Input Capture:Keylogging
njRAT is capable of logging keystrokes.
Input Capture:Keylogging
It has used keylogging tools called KEYPUNCH and LONGWATCH.
Input Capture:Keylogging
Okrum was seen using a keylogger tool to capture keystrokes.
Input Capture:Keylogging
During Operation Wocao, threat actors obtained the password for the victim's password manager via a custom keylogger.
Input Capture:Keylogging
OwaAuth captures and DES-encrypts credentials before writing the username and password to a log file, C:\log.txt.
Input Capture:Keylogging
PcShare has the ability to capture keystrokes.
Input Capture:Keylogging
Peppy can log keystrokes on compromised hosts.
Input Capture:Keylogging
It has used several different keyloggers.
Input Capture:Keylogging
PlugX has a module for capturing keystrokes per process including window titles.
Input Capture:Keylogging
PoetRAT has used a Python tool named klog.exe for keylogging.
Input Capture:Keylogging
PoisonIvy contains a keylogger.
Input Capture:Keylogging
PoshC2 has modules for keystroke logging and capturing credentials from spoofed Outlook authentication messages.
Input Capture:Keylogging
PowerLess can use a module to log keystrokes.
Input Capture:Keylogging
PowerSploit's Get-Keystrokes Exfiltration module can log keystrokes.
Input Capture:Keylogging
Prikormka contains a keylogger module that collects keystrokes and the titles of foreground windows.
Input Capture:Keylogging
Proton uses a keylogger to capture keystrokes.
Input Capture:Keylogging
Pupy uses a keylogger to capture keystrokes it then sends back to the server after it is stopped.
Input Capture:Keylogging
QakBot can capture keystrokes on a compromised host.
Input Capture:Keylogging
QuasarRAT has a built-in keylogger.