Class: Trojan
A malicious program designed to electronically spy on the user’s activities (intercept keyboard input, take screenshots, capture a list of active applications, etc.). The collected information is sent to the cybercriminal by various means, including email, FTP, and HTTP (by sending data in a request).Read more
Platform: Win32
Win32 is an API on Windows NT-based operating systems (Windows XP, Windows 7, etc.) that supports execution of 32-bit applications. One of the most widespread programming platforms in the world.Family: Trojan.Win32.VBKrypt
No family descriptionExamples
CCE203E12028AB2162305306070984ECAE655CEDF245B5DBE7B735AB3B3D6155
63F019BC976BFA56E6ED27881B030F49
54603855873DD61348C7ABAD425FB06F
D5A326D359D9D86C5CD57F4F3EC3B567
Tactics and Techniques: Mitre*
TA0040
Impact
Adversaries may insert, delete, or manipulate data in order to influence external outcomes or hide activity, thus threatening the integrity of the data. By manipulating data, adversaries may attempt to affect a business process, organizational understanding, or decision making.
T1565
Data Manipulation
Adversaries may insert, delete, or manipulate data in order to influence external outcomes or hide activity, thus threatening the integrity of the data. By manipulating data, adversaries may attempt to affect a business process, organizational understanding, or decision making.
* © 2025 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.