text1 stringlengths 7 2.5k | labels stringlengths 9 100 |
|---|---|
Bandook contains keylogging capabilities. | ['T1056.001'] |
BlackEnergy has run a keylogger plug-in on a victim. | ['T1056.001'] |
CHOPSTICK is capable of performing keylogging. | ['T1056.001'] |
Carbanak logs key strokes for configured processes and sends them back to the C2 server. | ['T1056.001'] |
Cardinal RAT can log keystrokes. | ['T1056.001'] |
Catchamas collects keystrokes from the victim’s machine. | ['T1056.001'] |
Cobalt Strike can track key presses with a keylogger module. | ['T1056.001'] |
Cobian RAT has a feature to perform keylogging on the victim’s machine. | ['T1056.001'] |
CosmicDuke uses a keylogger. | ['T1056.001'] |
Crimson can use a module to perform keylogging on compromised hosts. | ['T1056.001'] |
Cuba logs keystrokes via polling by using "GetKeyState" and "VkKeyScan" functions. | ['T1056.001'] |
DarkComet has a keylogging capability. | ['T1056.001'] |
DarkWatchman can track key presses with a keylogger module. | ['T1056.001'] |
Darkhotel has used a keylogger. | ['T1056.001'] |
Dtrack’s dropper contains a keylogging executable. | ['T1056.001'] |
Duqu can track key presses with a keylogger module. | ['T1056.001'] |
DustySky contains a keylogger. | ['T1056.001'] |
ECCENTRICBANDWAGON can capture and store keystrokes. | ['T1056.001'] |
EvilGrab has the capability to capture keystrokes. | ['T1056.001'] |
FIN4 has captured credentials via fake Outlook Web App (OWA) login pages and has also used a .NET based keylogger. | ['T1056.001'] |
FakeM contains a keylogger module. | ['T1056.001'] |
FlawedAmmyy can collect keyboard events. | ['T1056.001'] |
Fysbis can perform keylogging. | ['T1056.001'] |
Grandoreiro can log keystrokes on the victim's machine. | ['T1056.001'] |
GreyEnergy has a module to harvest pressed keystrokes. | ['T1056.001'] |
HEXANE has used a PowerShell-based keylogger named `kl.ps1`. | ['T1056.001'] |
HTTPBrowser is capable of capturing keystrokes on victims. | ['T1056.001'] |
Imminent Monitor has a keylogging module. | ['T1056.001'] |
KGH_SPY can perform keylogging by polling the "GetAsyncKeyState()" function. | ['T1056.001'] |
KONNI has the capability to perform keylogging. | ['T1056.001'] |
Kasidet has the ability to initiate keylogging. | ['T1056.001'] |
KeyBoy installs a keylogger for intercepting credentials and keystrokes. | ['T1056.001'] |
Kimsuky has used a PowerShell-based keylogger as well as a tool called MECHANICAL to log keystrokes. | ['T1056.001'] |
Kivars has the ability to initiate keylogging on the infected host. | ['T1056.001'] |
Lazarus Group malware KiloAlfa contains keylogging functionality. | ['T1056.001'] |
Lokibot has the ability to capture input on the compromised host via keylogging. | ['T1056.001'] |
MacMa can use Core Graphics Event Taps to intercept user keystrokes from any text input field and saves them to text files. Text input fields include Spotlight, Finder, Safari, Mail, Messages, and other apps that have text fields for passwords. | ['T1056.001'] |
MacSpy captures keystrokes. | ['T1056.001'] |
Matryoshka is capable of keylogging. | ['T1056.001'] |
Metamorfo has a command to launch a keylogger and capture keystrokes on the victim’s machine. | ['T1056.001'] |
Micropsia has keylogging capabilities. | ['T1056.001'] |
MoonWind has a keylogger. | ['T1056.001'] |
NanoCore can perform keylogging on the victim’s machine. | ['T1056.001'] |
NavRAT logs the keystrokes on the targeted system. | ['T1056.001'] |
OilRig has used keylogging tools called KEYPUNCH and LONGWATCH. | ['T1056.001'] |
Okrum was seen using a keylogger tool to capture keystrokes. | ['T1056.001'] |
One of Attor's plugins can collect user credentials via capturing keystrokes and can capture keystrokes pressed within the window of the injected process. | ['T1056.001'] |
Operation Wocao has obtained the password for the victim's password manager via a custom keylogger. | ['T1056.001'] |
OwaAuth captures and DES-encrypts credentials before writing the username and password to a log file, "C:\log.txt". | ['T1056.001'] |
PLATINUM has used several different keyloggers. | ['T1056.001'] |
Peppy can log keystrokes on compromised hosts. | ['T1056.001'] |
PlugX has a module for capturing keystrokes per process including window titles. | ['T1056.001'] |
PoisonIvy contains a keylogger. | ['T1056.001'] |
PoshC2 has modules for keystroke logging and capturing credentials from spoofed Outlook authentication messages. | ['T1056.001'] |
PowerSploit's "Get-Keystrokes" Exfiltration module can log keystrokes. | ['T1056.001'] |
Prikormka contains a keylogger module that collects keystrokes and the titles of foreground windows. | ['T1056.001'] |
Pupy uses a keylogger to capture keystrokes it then sends back to the server after it is stopped. | ['T1056.001'] |
QakBot can capture keystrokes on a compromised host. | ['T1056.001'] |
QuasarRAT has a built-in keylogger. | ['T1056.001'] |
ROKRAT can use `SetWindowsHookEx` and `GetKeyNameText` to capture keystrokes. | ['T1056.001'] |
RTM can record keystrokes from both the keyboard and virtual keyboard. | ['T1056.001'] |
Regin contains a keylogger. | ['T1056.001'] |
Remcos has a command for keylogging. | ['T1056.001'] |
Remexi gathers and exfiltrates keystrokes from the machine. | ['T1056.001'] |
Remsec contains a keylogger component. | ['T1056.001'] |
Rover has keylogging functionality. | ['T1056.001'] |
RunningRAT captures keystrokes and sends them back to the C2 server. | ['T1056.001'] |
SLOTHFULMEDIA has a keylogging capability. | ['T1056.001'] |
SMOKEDHAM can continuously capture keystrokes. | ['T1056.001'] |
Sandworm Team has used a keylogger to capture keystrokes by using the SetWindowsHookEx function. | ['T1056.001'] |
Sowbug has used keylogging tools. | ['T1056.001'] |
SslMM creates a new thread implementing a keylogging facility using Windows Keyboard Accelerators. | ['T1056.001'] |
Sykipot contains keylogging functionality to steal passwords. | ['T1056.001'] |
TajMahal has the ability to capture keystrokes on an infected host. | ['T1056.001'] |
The FunnyDream Keyrecord component can capture keystrokes. | ['T1056.001'] |
The executable version of Helminth has a module to log keystrokes. | ['T1056.001'] |
ThiefQuest uses the "CGEventTap" functions to perform keylogging. | ['T1056.001'] |
Threat Group-3390 actors installed a credential logger on Microsoft Exchange servers. Threat Group-3390 also leveraged the reconnaissance framework, ScanBox, to capture keystrokes. | ['T1056.001'] |
TinyZBot contains keylogger functionality. | ['T1056.001'] |
Tonto Team has used keylogging tools in their operations. | ['T1056.001'] |
Trojan.Karagany can capture keystrokes on a compromised host. | ['T1056.001'] |
Unknown Logger is capable of recording keystrokes. | ['T1056.001'] |
VERMIN collects keystrokes from the victim machine. | ['T1056.001'] |
XAgentOSX contains keylogging functionality that will monitor for active application windows and write them to the log, it can handle special characters, and it will buffer by default 50 characters before sending them out over the C2 infrastructure. | ['T1056.001'] |
Zeus Panda can perform keylogging on the victim’s machine by hooking the functions TranslateMessage and WM_KEYDOWN. | ['T1056.001'] |
ZxShell has a feature to capture a remote computer's keystrokes using a keylogger. | ['T1056.001'] |
jRAT has the capability to log keystrokes from the victim’s machine, both offline and online. | ['T1056.001'] |
menuPass has used key loggers to steal usernames and passwords. | ['T1056.001'] |
yty uses a keylogger plugin to gather keystrokes. | ['T1056.001'] |
Calisto presents an input prompt asking for the user's login and password. | ['T1056.002'] |
Dok prompts the user for credentials. | ['T1056.002'] |
FIN4 has presented victims with spoofed Windows Authentication prompts to collect their credentials. | ['T1056.002'] |
Keydnap prompts the users for credentials. | ['T1056.002'] |
Metamorfo has displayed fake forms on top of banking sites to intercept credentials from victims. | ['T1056.002'] |
XCSSET prompts the user to input credentials using a native macOS dialog box leveraging the system process "/Applications/Safari.app/Contents/MacOS/SafariForWebKitDevelopment". | ['T1056.002'] |
iKitten prompts the user for their credentials. | ['T1056.002'] |
Empire contains some modules that leverage API hooking to carry out tasks, such as netripper. | ['T1056.004'] |
NOKKI uses the Windows call SetWindowsHookEx and begins injecting it into every GUI process running on the victim's machine. | ['T1056.004'] |
PLATINUM is capable of using Windows hook interfaces for information gathering such as credential access. | ['T1056.004'] |
RDFSNIFFER hooks several Win32 API functions to hijack elements of the remote system management user-interface. | ['T1056.004'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.