πŸ“ Raw Data

Info-stealers capture a significant amount of data that is then used by threat actors to perform attacks. Hudson Rock parses the data so it can be easily provided to its clients.

πŸ“˜

File/DirectoryExplanation
passwords.txtThis file contains all the URLs, logins, and passwords stored on the compromised computer.
UserInformation.txtThis file contains all the technical information of the compromised computer, including the computer's name, IP address, path in which the malware was installed, anti-viruses installed on the computer, operation system specifications and more.
CookiesThese files contain the cookies that were captured from the compromised computer, allowing threat actors to bypass traditional security measures such as 2FA by stealing the session of the victim.
AutofillsContains form data automatically filled by browsers, including names, addresses, phone numbers, and other personal information that users have saved for convenience.
WalletsContains cryptocurrency wallet information, including wallet addresses, private keys, seed phrases, and wallet.dat files, enabling direct theft of digital assets.
ApplicationsContains credentials and configuration files from installed applications such as FTP clients, VPN software, SSH keys, email clients, and messaging apps.
HistoryContains browsing history data that reveals patterns of behavior, frequently visited sites, and potentially sensitive information about the victim's activities and interests.
CreditCardsContains stored credit card information from browsers, including card numbers, expiration dates, CVV codes, and cardholder names, enabling financial fraud.

Directory Tree of a Single Compromised Computer

BE[84B0415EF1910CC058EAE0039562018F] [2022-04-12T12_46_30.0143822-07_00]
Steam
πŸ“„ coplay_76561198437305837.vdf
πŸ“„ ssfn58921797684987530
πŸ“„ DialogConfigOverlay_1920x1080.vdf
πŸ“„ ssfn7004504802990646383
πŸ“„ libraryfolders.vdf
πŸ“„ config.vdf
πŸ“„ DialogConfig.vdf
πŸ“„ loginusers.vdf
πŸ“„ DialogConfigOverlay_1680x1050.vdf
Discord
πŸ“„ Tokens.txt
Wallets
Google_[Chrome]_Default_MaiarDeFiWallet
πŸ“„ 000003.log
πŸ“„ MANIFEST-000001
πŸ“„ LOG
πŸ“„ LOG.old
πŸ“„ CURRENT
Google_[Chrome]_Default_Phantom
πŸ“„ 000018.ldb
πŸ“„ 000005.ldb
πŸ“„ MANIFEST-000001
πŸ“„ LOG
πŸ“„ LOG.old
πŸ“„ CURRENT
πŸ“„ 000016.log
BraveSoftware_[Brave-Browser]_Default_Phantom
πŸ“„ 000003.log
πŸ“„ MANIFEST-000001
πŸ“„ LOG
πŸ“„ LOG.old
πŸ“„ CURRENT
Google_[Chrome]_Default_YoroiWallet
πŸ“„ 000003.log
πŸ“„ MANIFEST-000001
πŸ“„ LOG
πŸ“„ LOG.old
πŸ“„ CURRENT
Google_[Chrome]_Profile 12_Metamask
πŸ“„ 000005.ldb
πŸ“„ MANIFEST-000001
πŸ“„ 000028.ldb
πŸ“„ LOG
πŸ“„ 000031.log
πŸ“„ LOG.old
πŸ“„ 000030.ldb
πŸ“„ CURRENT
Exodus
πŸ“„ market-history-cache.json
πŸ“„ exodus.conf.json
πŸ“„ exodus.wallet
πŸ“„ seed.seco
πŸ“„ info.seco
πŸ“„ twofactor-secret.seco
πŸ“„ twofactor.seco
πŸ“„ window-state.json
πŸ“„ announcements.json
FileGrabber
Users
augus
Desktop
πŸ“„ hack.txt
πŸ“„ Amazon liste.txt
πŸ“„ PC.txt
πŸ“„ NFT.txt
πŸ“„ planning avril mai.txt
πŸ“„ comptes PrimeXBT.txt
Documents
πŸ“„ 2.docx
πŸ“„ Passwords.txt
πŸ“„ UserInformation.txt
πŸ“„ ImportantAutofills.txt
Cookies
πŸ“„ Google_[Chrome]_Profile 6 Network.txt
πŸ“„ BraveSoftware_[Brave-Browser]_Profile 1 Network.txt
πŸ“„ Steam_[htmlcache]_Unknown.txt
Autofills
πŸ“„ Google_[Chrome]_Profile 4.txt
πŸ“„ Microsoft_[Edge]_Default.txt
πŸ“„ Google_[Chrome]_Default.txt
πŸ“„ BraveSoftware_[Brave-Browser]_Profile 2.txt
πŸ“„ Google_[Chrome]_Profile 7.txt
πŸ“„ Google_[Chrome]_Profile 5.txt
πŸ“„ Google_[Chrome]_Profile 12.txt
πŸ“„ DomainDetects.txt
πŸ“„ InstalledSoftware.txt
πŸ“„ InstalledSoftware.txt