Class: Trojan
A malicious program designed to electronically spy on the user’s activities (intercept keyboard input, take screenshots, capture a list of active applications, etc.). The collected information is sent to the cybercriminal by various means, including email, FTP, and HTTP (by sending data in a request).Read more
Platform: WinLNK
A file with the LNK extension is a Windows shortcut to a file, program, or folder.Family: Trojan.WinLNK.Rundel
No family descriptionExamples
B03D249159ADC776DE6ED5CEEE373B78FBFDFEEEE605F8713D68EBF7453A199C
480D957B0A63EB1F3AE51D130F2F4F58
3ADEA7F573662828010BB29D72E78B47
E231C4EC894897426C9FCA92BCE189E8
Tactics and Techniques: Mitre*
Adversaries may interact with the native OS application programming interface (API) to execute behaviors. Native APIs provide a controlled means of calling low-level OS services within the kernel, such as those involving hardware/devices, memory, and processes. These native APIs are leveraged by the OS during system boot (when other system components are not yet initialized) as well as carrying out tasks and requests during routine operations.
Adversaries may interact with the native OS application programming interface (API) to execute behaviors. Native APIs provide a controlled means of calling low-level OS services within the kernel, such as those involving hardware/devices, memory, and processes. These native APIs are leveraged by the OS during system boot (when other system components are not yet initialized) as well as carrying out tasks and requests during routine operations.
Adversaries may attempt to get a listing of open application windows. Window listings could convey information about how the system is used. For example, information about application windows could be used identify potential data to collect as well as identifying security tooling (Security Software Discovery) to evade.
Adversaries may attempt to get a listing of open application windows. Window listings could convey information about how the system is used. For example, information about application windows could be used identify potential data to collect as well as identifying security tooling (Security Software Discovery) to evade.
* © 2025 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.