Class: Trojan
A malicious program designed to electronically spy on the user’s activities (intercept keyboard input, take screenshots, capture a list of active applications, etc.). The collected information is sent to the cybercriminal by various means, including email, FTP, and HTTP (by sending data in a request).Read more
Platform:
No platform descriptionFamily: Trojan.Win64.Agent
No family descriptionExamples
9800B07CD46A077FF21CC8F4DD76D7F44DA6DA6B96BB71D89170EEBE30B2F7E3
DB6FD7E7E45C38A570AF5C7C670FB037
1018827D473C4131C1113F2A5D8D7320
80F60247CB082CA229C0BFAC952944DF
Tactics and Techniques: Mitre*
An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture. Adversaries may use the information from System Information Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture. Adversaries may use the information from System Information Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
* © 2026 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.