Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1547 | .004 | Boot or Logon Autostart Execution: Winlogon Helper DLL |
KeyBoy issues the command |
Enterprise | T1059 | .001 | Command and Scripting Interpreter: PowerShell |
KeyBoy uses PowerShell commands to download and execute payloads.[2] |
.003 | Command and Scripting Interpreter: Windows Command Shell |
KeyBoy can launch interactive shells for communicating with the victim machine.[2][3] |
||
.005 | Command and Scripting Interpreter: Visual Basic |
KeyBoy uses VBS scripts for installing files and performing execution.[1] |
||
.006 | Command and Scripting Interpreter: Python |
KeyBoy uses Python scripts for installing files and performing execution.[1] |
||
Enterprise | T1543 | .003 | Create or Modify System Process: Windows Service |
KeyBoy installs a service pointing to a malicious DLL dropped to disk.[3] |
Enterprise | T1555 | .003 | Credentials from Password Stores: Credentials from Web Browsers | |
Enterprise | T1001 | .003 | Data Obfuscation: Protocol Impersonation |
KeyBoy uses custom SSL libraries to impersonate SSL in C2 traffic.[2] |
Enterprise | T1083 | File and Directory Discovery |
KeyBoy has a command to launch a file browser or explorer on the system.[2] |
|
Enterprise | T1564 | .003 | Hide Artifacts: Hidden Window |
KeyBoy uses |
Enterprise | T1070 | .006 | Indicator Removal on Host: Timestomp | |
Enterprise | T1105 | Ingress Tool Transfer | ||
Enterprise | T1056 | .001 | Input Capture: Keylogging |
KeyBoy installs a keylogger for intercepting credentials and keystrokes.[3] |
Enterprise | T1559 | .002 | Inter-Process Communication: Dynamic Data Exchange |
KeyBoy uses the Dynamic Data Exchange (DDE) protocol to download remote payloads.[2] |
Enterprise | T1027 | Obfuscated Files or Information |
In one version of KeyBoy, string obfuscation routines were used to hide many of the critical values referenced in the malware.[1] |
|
Enterprise | T1113 | Screen Capture | ||
Enterprise | T1082 | System Information Discovery |
KeyBoy can gather extended system information, such as information about the operating system, disks, and memory.[2][3] |
|
Enterprise | T1016 | System Network Configuration Discovery |
KeyBoy can determine the public or WAN IP address for the system.[2] |
ID | Name | References |
---|---|---|
G0081 | Tropic Trooper |