text1
stringlengths 7
2.5k
| labels
stringlengths 9
100
|
---|---|
Agent Tesla can capture screenshots of the victim’s desktop. | ['T1113'] |
AppleSeed can take screenshots on a compromised host by calling a series of APIs. | ['T1113'] |
Aria-body has the ability to capture screenshots on compromised hosts. | ['T1113'] |
Attor's has a plugin that captures screenshots of the target applications. | ['T1113'] |
Azorult can capture screenshots of the victim’s machines. | ['T1113'] |
BADNEWS has a command to take a screenshot and send it to the C2 server. | ['T1113'] |
BISCUIT has a command to periodically take screenshots of the system. | ['T1113'] |
BLUELIGHT has captured a screenshot of the display every 30 seconds for the first 5 minutes after initiating a C2 loop, and then once every five minutes thereafter. | ['T1113'] |
BRONZE BUTLER has used a tool to capture screenshots. | ['T1113'] |
BadPatch captures screenshots in .jpg format and then exfiltrates them. | ['T1113'] |
Bandook is capable of taking an image of and uploading the current desktop. | ['T1113'] |
BlackEnergy is capable of taking screenshots. | ['T1113'] |
Cadelspy has the ability to capture screenshots and webcam photos. | ['T1113'] |
Cannon can take a screenshot of the desktop. | ['T1113'] |
Carbanak performs desktop video recording and captures screenshots of the desktop and sends it to the C2 server. | ['T1113'] |
Cardinal RAT can capture screenshots. | ['T1113'] |
Catchamas captures screenshots based on specific keywords in the window’s title. | ['T1113'] |
Chaes can capture screenshots of the infected machine. | ['T1113'] |
Chrommme has the ability to capture screenshots. | ['T1113'] |
Clambling has the ability to capture screenshots. | ['T1113'] |
Cobalt Strike's "beacon" payload is capable of capturing screenshots. | ['T1113'] |
Cobalt Strike's Beacon payload is capable of capturing screenshots. | ['T1113'] |
ConnectWise can take screenshots on remote hosts. | ['T1113'] |
CosmicDuke takes periodic screenshots and exfiltrates them. | ['T1113'] |
Crimson contains a command to perform screen captures. | ['T1113'] |
CrossRAT is capable of taking screen captures. | ['T1113'] |
DOGCALL is capable of capturing screenshots of the victim's machine. | ['T1113'] |
Dark Caracal took screenshots using their Windows malware. | ['T1113'] |
Daserf can take screenshots. | ['T1113'] |
Derusbi is capable of performing screen captures. | ['T1113'] |
Dragonfly 2.0 has performed screen captures of victims, including by using a tool, scr.exe (which matched the hash of ScreenUtil). | ['T1113'] |
Dragonfly has performed screen captures of victims, including by using a tool, scr.exe (which matched the hash of ScreenUtil). | ['T1113'] |
Dragonfly has performed screen captures of victims. | ['T1113'] |
DustySky captures PNG screenshots of the main screen. | ['T1113'] |
Empire is capable of capturing screenshots on Windows and macOS systems. | ['T1113'] |
EvilGrab has the capability to capture screenshots. | ['T1113'] |
FinFisher takes a screenshot of the screen and displays it on top of all other windows for few seconds in an apparent attempt to hide some messages showed by the system during the setup process. | ['T1113'] |
FlawedAmmyy can capture screenshots. | ['T1113'] |
FruitFly takes screenshots of the user's desktop. | ['T1113'] |
GOLD SOUTHFIELD has used the remote monitoring and management tool ConnectWise to obtain screen captures from victim's machines. | ['T1113'] |
HALFBAKED can obtain screenshots from the victim. | ['T1113'] |
HotCroissant has the ability to do real time screen viewing on an infected host. | ['T1113'] |
Hydraq includes a component based on the code of VNC that can stream a live feed of the desktop of an infected host. | ['T1113'] |
HyperBro has the ability to take screenshots. | ['T1113'] |
InvisiMole can capture screenshots of not only the entire screen, but of each separate window open, in case they are overlapping. | ['T1113'] |
Janicab captured screenshots and sent them out to a C2 server. | ['T1113'] |
KONNI can take screenshots of the victim’s machine. | ['T1113'] |
Kasidet has the ability to initiate keylogging and screen captures. | ['T1113'] |
Kivars has the ability to capture screenshots on the infected host. | ['T1113'] |
LitePower can take system screenshots and save them to `%AppData%`. | ['T1113'] |
Lizar can take JPEG screenshots of an infected system. | ['T1113'] |
LookBack can take desktop screenshots. | ['T1113'] |
MacMa has used Apple’s Core Graphic APIs, such as `CGWindowListCreateImageFromArray`, to capture the user's screen and open windows. | ['T1113'] |
MacSpy can capture screenshots of the desktop over multiple monitors. | ['T1113'] |
Machete captures screenshots. | ['T1113'] |
Malware used by Group5 is capable of watching the victim's screen. | ['T1113'] |
Matryoshka is capable of performing screen captures. | ['T1113'] |
Metamorfo can collect screenshots of the victim’s machine. | ['T1113'] |
Micropsia takes screenshots every 90 seconds by calling the Gdi32.BitBlt API. | ['T1113'] |
MuddyWater has used malware that can capture screenshots of the victim’s machine. | ['T1113'] |
NETWIRE can capture the victim's screen. | ['T1113'] |
ObliqueRAT can capture a screenshot of the current screen. | ['T1113'] |
OilRig has a tool called CANDYKING to capture a screenshot of user's desktop. | ['T1113'] |
POORAIM can perform screen capturing. | ['T1113'] |
POWRUNER can capture a screenshot from a victim. | ['T1113'] |
PcShare can take screen shots of a compromised machine. | ['T1113'] |
Peppy can take screenshots on targeted systems. | ['T1113'] |
PoetRAT has the ability to take screen captures. | ['T1113'] |
Prikormka contains a module that captures screenshots of the victim's desktop. | ['T1113'] |
Proton captures the content of the desktop with the screencapture binary. | ['T1113'] |
Pteranodon can capture screenshots at a configurable interval. | ['T1113'] |
Pupy can drop a mouse-logger that will take small screenshots around at each click and then send back to the server. | ['T1113'] |
QuietSieve has taken screenshots every five minutes and saved them to the user's local Application Data folder under `Temp\SymbolSourceSymbols\icons` or `Temp\ModeAuto\icons`. | ['T1113'] |
RCSession can capture screenshots from a compromised host. | ['T1113'] |
RDAT can take a screenshot on the infected system. | ['T1113'] |
ROKRAT can capture screenshots of the infected system using the `gdi32` library. | ['T1113'] |
RTM can capture screenshots. | ['T1113'] |
Remexi takes screenshots of windows of interest. | ['T1113'] |
RemoteUtilities can take screenshots on a compromised host. | ['T1113'] |
RogueRobin has a command named "$screenshot" that may be responsible for taking screenshots of the victim machine. | ['T1113'] |
Rover takes screenshots of the compromised system's desktop and saves them to "C:\system\screenshot.bmp" for exfiltration every 60 minutes. | ['T1113'] |
SHUTTERSPEED can capture screenshots. | ['T1113'] |
SILENTTRINITY can take a screenshot of the current desktop. | ['T1113'] |
SLOTHFULMEDIA has taken a screenshot of a victim's desktop, named it "Filter3.jpg", and stored it in the local directory. | ['T1113'] |
SMOKEDHAM can capture screenshots of the victim’s desktop. | ['T1113'] |
SharpStage has the ability to capture the victim's screen. | ['T1113'] |
Silence can capture victim screen activity. | ['T1113'] |
Sliver can take screenshots of the victim’s active display. | ['T1113'] |
Socksbot can take screenshots. | ['T1113'] |
StoneDrill can take screenshots. | ['T1113'] |
SysUpdate has the ability to capture screenshots. | ['T1113'] |
T9000 can take screenshots of the desktop and target application windows, saving them to user directories as one byte XOR encrypted .dat files. | ['T1113'] |
TURNEDUP is capable of taking screenshots. | ['T1113'] |
TajMahal has the ability to take screenshots on an infected host including capturing content from windows of instant messaging applications. | ['T1113'] |
The FunnyDream ScreenCap component can take screenshots on a compromised host. | ['T1113'] |
TinyZBot contains screen capture functionality. | ['T1113'] |
Trojan.Karagany can take a desktop screenshot and save the file into "\ProgramData\Mail\MailAg\shot.png". | ['T1113'] |
Turian has the ability to take screenshots. | ['T1113'] |
Ursnif has used hooked APIs to take screenshots. | ['T1113'] |
VERMIN can perform screen captures of the victim’s machine. | ['T1113'] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.