Description
A Keylogger feature in malware acts as a covert surveillance mechanism, recording every keystroke made on the compromised system. This enables attackers to capture a wide range of sensitive information, from login credentials and personal identification numbers to confidential communications and proprietary code. The collected data is typically encrypted and transmitted to a remote server, where it is decoded and analyzed. Beyond just stealing information, the Keylogger can also provide insights into user behavior and system interactions, allowing attackers to fine-tune their strategies for further exploitation or lateral movement within a network. In essence, the Keylogger serves as both a data harvesting tool and a reconnaissance instrument, making it one of the most insidious features in modern malware.
| Categories | Spy / Surveillance, Credentials |
| Dangerousness | High |
Hue 1.0
ProRat 1.2
ProRat 1.3
Nuclear RAT 1.0 Beta 5
Beast 2.06
ProRat 1.4
LanFiltrator 1.5 Beta III
ProRat 1.6
ProRat 1.8
Infector NG 2004 2.1.0
Elite Keylogger 1.0
Optix Pro 1.33
Beast 2.07
Flux 1.0
CIA 1.3
Messiah 4.0
ProAgent 2.0
ProRat 1.9
Y3K rat 2k5 RC 1.0
Y3K rat 2k5 RC 1.1
TrojNa$ 1.0
Bersek 1.1
Turkojan 3.0
Bifrost 1.2.1
Hav-Rat 1.2
Bandook 1.35
Poison Ivy 2.3.0
Hav-Rat 1.3.2
sharK 2.4.0 Fwb+
DARKMOON 4.11 Private Edition
Nuclear RAT 2.1.0
Bump-Rat 1.2 Beta
Poison Ivy 2.3.2
Lost Door 1.0
ZombieRat 1.2
Lost Door 2.0
Turkojan 4
Turkojan 4.0
sharK 3.1 fwb++
Lost Door 2.2
Aero 2
Lost Door 3.0 Stable
SynRAT 4.0.1
PrjRAPTOR 1.8
Cerberus 1.0 Beta
Cerberus 1.01 Beta
Cerberus 1.02 Beta
SynRAT 4.3.1-A-1
Apocalypse RAT 1.4
Cerberus 1.03.4