The information gathering Trojan can continuously monitor clipboard content, searching for cryptocurrency keys and passwords.