Class: Trojan
A malicious program designed to electronically spy on the user’s activities (intercept keyboard input, take screenshots, capture a list of active applications, etc.). The collected information is sent to the cybercriminal by various means, including email, FTP, and HTTP (by sending data in a request).Read more
Platform: BAT
No platform descriptionFamily: Trojan.Win64.Agent
No family descriptionExamples
A479DE15229AEFA7C83B9A334A323578053F301558165B4899B9CBC4BF1FCC0D
B40216ADBC757E6DD8E0A139111E20B6
6CD3B4AFE276906E9DBD5557F36BA658
6736D59B343A2C7CFD7101F2198BCBA0
Tactics and Techniques: Mitre*
Adversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files. File and directory permissions are commonly managed by ACLs configured by the file or directory owner, or users with the appropriate permissions. File and directory ACL implementations vary by platform, but generally explicitly designate which users or groups can perform which actions (read, write, execute, etc.).
Adversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files. File and directory permissions are commonly managed by ACLs configured by the file or directory owner, or users with the appropriate permissions. File and directory ACL implementations vary by platform, but generally explicitly designate which users or groups can perform which actions (read, write, execute, etc.).
* © 2025 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.