Kategorie: HackTool
HackTool-Programme werden verwendet, um neue Benutzer in der Liste der zulässigen Systembesucher zu erstellen und Informationen aus Systemprotokollen zu löschen, um die Anwesenheit des böswilligen Benutzers auf dem System zu verbergen. Diese Programme werden auch verwendet, um Netzwerkpakete zu analysieren und zu sammeln, um bestimmte bösartige Aktionen auszuführen.Schädliche Benutzer setzen HackTool-Programme ein, wenn sie Angriffe auf lokale oder Remote-Computer einrichten.
Mehr Informationen
Plattform: Win32
Win32 ist eine API auf Windows NT-basierten Betriebssystemen (Windows XP, Windows 7 usw.), die die Ausführung von 32-Bit-Anwendungen unterstützt. Eine der am weitesten verbreiteten Programmierplattformen der Welt.Familie: HackTool.Win32.AmsiETWPatch
No family descriptionExamples
F9BFB1A8098B7A6DC293A5729529DB75452959982E7F2E32A468905FBE155581
E58A85CC6D8E322CA71A0AB64D5BED14
06F6F820C0B391766FAB190037448964
74A2F47C087CCDDACBCC4305FD8DF1AE
Tactics and Techniques: Mitre*
TA0009
Collection
The adversary is trying to gather data of interest to their goal.
Collection consists of techniques adversaries may use to gather information and the sources information is collected from that are relevant to following through on the adversary's objectives. Frequently, the next goal after collecting data is to steal (exfiltrate) the data. Common target sources include various drive types, browsers, audio, video, and email. Common collection methods include capturing screenshots and keyboard input.
Collection consists of techniques adversaries may use to gather information and the sources information is collected from that are relevant to following through on the adversary's objectives. Frequently, the next goal after collecting data is to steal (exfiltrate) the data. Common target sources include various drive types, browsers, audio, video, and email. Common collection methods include capturing screenshots and keyboard input.
T1113
Screen Capture
Adversaries may attempt to take screen captures of the desktop to gather information over the course of an operation. Screen capturing functionality may be included as a feature of a remote access tool used in post-compromise operations. Taking a screenshot is also typically possible through native utilities or API calls, such as
CopyFromScreen, xwd, or screencapture.(Citation: CopyFromScreen .NET)(Citation: Antiquated Mac Malware)* © 2026 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.