Classe: Trojan-PSW
Les programmes Trojan-PSW sont conçus pour dérober des informations de compte d'utilisateur telles que les connexions et les mots de passe des ordinateurs infectés. PSW est un acronyme de Password Stealing Ware. Lorsqu'il est lancé, un cheval de Troie PSW recherche les fichiers système qui stockent une série de données confidentielles ou le registre. Si de telles données sont trouvées, le cheval de Troie l'envoie à son «maître». L'email, le ftp, le Web (y compris les données dans une demande), ou d'autres méthodes peuvent être utilisés pour passer les données volées. Certains de ces chevaux de Troie volent également des informations d'enregistrement pour certains logiciels.Plus d'informations
Plateforme: MSIL
Le Common Intermediate Language (anciennement connu sous le nom de Microsoft Intermediate Language, ou MSIL) est un langage intermédiaire développé par Microsoft pour le .NET Framework. Le code CIL est généré par tous les compilateurs Microsoft .NET dans Microsoft Visual Studio (Visual Basic .NET, Visual C ++, Visual C # et autres).Famille: Trojan-PSW.MSIL.Stealer
No family descriptionExamples
00191B15639CA4F2F312914A5E0306C0041F1E6318C7A5C0169705002B84C7BA
C8EBBF03ABBBA8EE46EA66FFBC751A0B
F8CEFF33F65668F3D92F1927ABA37A6A
68ACD3426E5324287984C02A7ACBE17F
Tactics and Techniques: Mitre*
TA0007
Discovery
The adversary is trying to figure out your environment.
Discovery consists of techniques an adversary may use to gain knowledge about the system and internal network. These techniques help adversaries observe the environment and orient themselves before deciding how to act. They also allow adversaries to explore what they can control and what’s around their entry point in order to discover how it could benefit their current objective. Native operating system tools are often used toward this post-compromise information-gathering objective.
Discovery consists of techniques an adversary may use to gain knowledge about the system and internal network. These techniques help adversaries observe the environment and orient themselves before deciding how to act. They also allow adversaries to explore what they can control and what’s around their entry point in order to discover how it could benefit their current objective. Native operating system tools are often used toward this post-compromise information-gathering objective.
T1120
Peripheral Device Discovery
Adversaries may attempt to gather information about attached peripheral devices and components connected to a computer system.(Citation: Peripheral Discovery Linux)(Citation: Peripheral Discovery macOS) Peripheral devices could include auxiliary resources that support a variety of functionalities such as keyboards, printers, cameras, smart card readers, or removable storage. The information may be used to enhance their awareness of the system and network environment or may be used for further actions.
* © 2026 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.