πŸ“ Raw Data

Info-stealers capture a significant amount of data that is then used by threat actors to perform attacks. Hudson Rock parses the data so it can be easily provided to its clients.

πŸ“˜

To learn about Infostealers, read this 3 piece research by Hudson Rock

File/DirectoryExplanation
passwords.txtThis file contains all the URLs, logins, and passwords stored on the compromised computer.
UserInformation.txtThis file contains all the technical information of the compromised computer, including the computer's name, IP address, path in which the malware was installed, anti-viruses installed on the computer, operation system specifications and more.
CookiesThese files contain the cookies that were captured from the compromised computer, allowing threat actors to bypass traditional security measures such as 2FA by stealing the session of the victim.
AutofillsContains form data automatically filled by browsers, including names, addresses, phone numbers, and other personal information that users have saved for convenience.
WalletsContains cryptocurrency wallet information, including wallet addresses, private keys, seed phrases, and wallet.dat files, enabling direct theft of digital assets.
ApplicationsContains credentials and configuration files from installed applications such as FTP clients, VPN software, SSH keys, email clients, and messaging apps.
HistoryContains browsing history data that reveals patterns of behavior, frequently visited sites, and potentially sensitive information about the victim's activities and interests.
CreditCardsContains stored credit card information from browsers, including card numbers, expiration dates, CVV codes, and cardholder names, enabling financial fraud.

Directory Tree of a Single Compromised Computer

BE[84B0415EF1910CC058EAE0039562018F] [2022-04-12T12_46_30.0143822-07_00]
Steam

πŸ“„ coplay_76561198437305837.vdf

πŸ“„ ssfn58921797684987530

πŸ“„ DialogConfigOverlay_1920x1080.vdf

πŸ“„ ssfn7004504802990646383

πŸ“„ libraryfolders.vdf

πŸ“„ config.vdf

πŸ“„ DialogConfig.vdf

πŸ“„ loginusers.vdf

πŸ“„ DialogConfigOverlay_1680x1050.vdf

Discord

πŸ“„ Tokens.txt

Wallets
Google_[Chrome]_Default_MaiarDeFiWallet

πŸ“„ 000003.log

πŸ“„ MANIFEST-000001

πŸ“„ LOG

πŸ“„ LOG.old

πŸ“„ CURRENT

Google_[Chrome]_Default_Phantom

πŸ“„ 000018.ldb

πŸ“„ 000005.ldb

πŸ“„ MANIFEST-000001

πŸ“„ LOG

πŸ“„ LOG.old

πŸ“„ CURRENT

πŸ“„ 000016.log

BraveSoftware_[Brave-Browser]_Default_Phantom

πŸ“„ 000003.log

πŸ“„ MANIFEST-000001

πŸ“„ LOG

πŸ“„ LOG.old

πŸ“„ CURRENT

Google_[Chrome]_Default_YoroiWallet

πŸ“„ 000003.log

πŸ“„ MANIFEST-000001

πŸ“„ LOG

πŸ“„ LOG.old

πŸ“„ CURRENT

Google_[Chrome]_Profile 12_Metamask

πŸ“„ 000005.ldb

πŸ“„ MANIFEST-000001

πŸ“„ 000028.ldb

πŸ“„ LOG

πŸ“„ 000031.log

πŸ“„ LOG.old

πŸ“„ 000030.ldb

πŸ“„ CURRENT

Exodus

πŸ“„ market-history-cache.json

πŸ“„ exodus.conf.json

πŸ“„ exodus.wallet

πŸ“„ seed.seco

πŸ“„ info.seco

πŸ“„ twofactor-secret.seco

πŸ“„ twofactor.seco

πŸ“„ window-state.json

πŸ“„ announcements.json

FileGrabber
Users
augus
Desktop

πŸ“„ hack.txt

πŸ“„ Amazon liste.txt

πŸ“„ PC.txt

πŸ“„ NFT.txt

πŸ“„ planning avril mai.txt

πŸ“„ comptes PrimeXBT.txt

Documents

πŸ“„ 2.docx

πŸ“„ Passwords.txt

πŸ“„ UserInformation.txt

πŸ“„ ImportantAutofills.txt

Cookies

πŸ“„ Google_[Chrome]_Profile 6 Network.txt

πŸ“„ BraveSoftware_[Brave-Browser]_Profile 1 Network.txt

πŸ“„ Steam_[htmlcache]_Unknown.txt

Autofills

πŸ“„ Google_[Chrome]_Profile 4.txt

πŸ“„ Microsoft_[Edge]_Default.txt

πŸ“„ Google_[Chrome]_Default.txt

πŸ“„ BraveSoftware_[Brave-Browser]_Profile 2.txt

πŸ“„ Google_[Chrome]_Profile 7.txt

πŸ“„ Google_[Chrome]_Profile 5.txt

πŸ“„ Google_[Chrome]_Profile 12.txt

πŸ“„ DomainDetects.txt

πŸ“„ InstalledSoftware.txt

πŸ“„ InstalledSoftware.txt