ETDA สำนักงานพัฒนาธุรกรรมทางอิเล็กทรอนิกส์
Electronic Transactions Development Agency
Report
Search
Home > List all groups > List all tools > List all groups using tool KeyBoy

Threat Group Cards: A Threat Actor Encyclopedia

Permanent link Tool: KeyBoy

NamesKeyBoy
TSSL
CategoryMalware
TypeReconnaissance, Backdoor, Info stealer, Exfiltration
Description(PWC) The malware leveraged by KeyBoy has a plethora of functionality, including, but not limited to:

• Screen grabbing/taking screenshots;
• Determine public or WAN IP address (using a public IP service), likely for determining a suited target;
• Gather extended system information, such as information about the operating system, disks, memory and so on;
• A ‘file browser’ or explorer;
• Shutdown and reboot commands (in addition to the point below);
• Launching interactive shells for communicating with the victim machine;
• Download and upload functionality; and
• Usage of custom SSL libraries for masquerading C2 traffic.
Information<https://www.pwc.co.uk/issues/cyber-security-data-privacy/research/the-keyboys-are-back-in-town.html>
<https://blog.trendmicro.com/trendlabs-security-intelligence/tropic-trooper-new-strategy/>
<https://citizenlab.ca/2016/11/parliament-keyboy/>
<https://blog.rapid7.com/2013/06/07/keyboy-targeted-attacks-against-vietnam-and-india/>
MITRE ATT&CK<https://attack.mitre.org/software/S0387/>
Malpedia<https://malpedia.caad.fkie.fraunhofer.de/details/win.keyboy>
AlienVault OTX<https://otx.alienvault.com/browse/pulses?q=tag:keyboy>

Last change to this tool card: 14 May 2020

Download this tool card in JSON format

Previous: KevDroid
Next: KEYMARBLE

All groups using tool KeyBoy

ChangedNameCountryObserved

APT groups

 Tropic Trooper, Pirate Panda, APT 23, KeyBoyChina2011-Jul 2020 

1 group listed (1 APT, 0 other, 0 unknown)

Digital Service Security Center
Electronic Transactions Development Agency

Follow us on

Facebook Twitter

Report incidents

Telephone +66 (0)2-123-1227
E-mail [email protected]