Description
A Keylogger feature in malware acts as a covert surveillance mechanism, recording every keystroke made on the compromised system. This enables attackers to capture a wide range of sensitive information, from login credentials and personal identification numbers to confidential communications and proprietary code. The collected data is typically encrypted and transmitted to a remote server, where it is decoded and analyzed. Beyond just stealing information, the Keylogger can also provide insights into user behavior and system interactions, allowing attackers to fine-tune their strategies for further exploitation or lateral movement within a network. In essence, the Keylogger serves as both a data harvesting tool and a reconnaissance instrument, making it one of the most insidious features in modern malware.
| Categories | Spy / Surveillance, Credentials |
| Dangerousness | High |
Beast 2.06
ProRat 1.4
LanFiltrator 1.5 Beta III
ProRat 1.6
ProRat 1.8
Infector NG 2004 2.1.0
Elite Keylogger 1.0
Optix Pro 1.33
Beast 2.07
Flux 1.0
CIA 1.3
ProAgent 2.0
ProRat 1.9
Y3K rat 2k5 RC 1.0
DARKMOON 4.11 / 4.11 Private Edition
TrojNa$ 1.0
Bersek 1.1
Turkojan 3.0
Bifrost 1.2.1
Hav-Rat 1.2
Bandook 1.35
Poison Ivy 2.3.0
Hav-Rat 1.3.2
sharK 2.4.0 Fwb+
Nuclear RAT 2.1.0
Poison Ivy 2.3.2
Turkojan 4
Turkojan 4.0
sharK 3.1 fwb++
Lost Door 3.0 Stable
SynRAT 4.0.1
PrjRAPTOR 1.8
Cerberus 1.0 Beta
Cerberus 1.01 Beta
Cerberus 1.02 Beta
SynRAT 4.3.1-A-1
Apocalypse RAT 1.4
Cerberus 1.03.4
Spy-Net 2.6
DarkComet RAT 1.3
Cerberus 1.03.5 Beta
DarkComet RAT 2.0 RC4
CyberGate 1.04.8
Lost Door 4.3.1
DarkComet RAT 2.0 RC7
Schwarze Sonne 1.0
Lost Door 5.1
Xtreme RAT 2.9
DarkComet RAT 5.3
DarkComet RAT 5.3.1