Class: Trojan
A malicious program designed to electronically spy on the user’s activities (intercept keyboard input, take screenshots, capture a list of active applications, etc.). The collected information is sent to the cybercriminal by various means, including email, FTP, and HTTP (by sending data in a request).Read more
Platform: Win32
Win32 is an API on Windows NT-based operating systems (Windows XP, Windows 7, etc.) that supports execution of 32-bit applications. One of the most widespread programming platforms in the world.Family: Trojan.Win32.Diztakun
No family descriptionExamples
F01550CBE57EA96862B8D093822E9FC15AB39300ED8A1EA290DA1282717859BC
76FA4A0CC386B228788DA56BAE596B26
B0B620CC5BFC918F3FB44FD589FD997B
EB150C86853B8C47542DF62CB9674B98
Tactics and Techniques: Mitre*
An adversary may gather the system time and/or time zone settings from a local or remote system. The system time is set and stored by services, such as the Windows Time Service on Windows or systemsetup
on macOS. These time settings may also be synchronized between systems and services in an enterprise network, typically accomplished with a network time server within a domain.
An adversary may gather the system time and/or time zone settings from a local or remote system. The system time is set and stored by services, such as the Windows Time Service on Windows or systemsetup
on macOS. These time settings may also be synchronized between systems and services in an enterprise network, typically accomplished with a network time server within a domain.
* © 2025 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.