/universal_stealer_log_parser

Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber security students and professionals.

Primary LanguagePython

What is Stealer malware and how does it operate?

Stealer malware is a type of malware that is designed to steal sensitive information from infected systems. When executed, it typically searches for and collects data such as browser-saved login credentials, credit card information, browser history and cookies, cryptocurrency wallet access, desktop files, gaming credentials among other technical instance’s information and it even takes desktop screenshots.

This information is then sent back to the attacker’s command and control server, where it can be used for malicious purposes such as identity theft, financial fraud, or espionage.

Stealer malware can be distributed through various means, including phishing emails, malicious websites, and infected software downloads. Once installed on a system, it can operate in the background without the user’s knowledge, collecting data and sending it back to the attacker.

Most antivirus software can’t detect stealer malware.

As a cyber security researcher I work with stealer malware logs on a daily basis, that's why I decided to facilitate my life and automate some of the processes.

Universal stealer malware logs parser

This tool is designed to retrieve all the compromised accounts and credit cards from stealer malware logs. Made for cyber security educational purposes only.

Currently supports:

  • Racoon,
  • StealC,
  • RedLine,
  • Aurora,
  • Meta,
  • Paranoid checker logs,
  • CINOSHI stealer/botnet/clipper/miner,
  • [EXPERTLOGS STEALER],
  • MoonLog (RedLine),
  • other modified RedLine or Racoon family stealer malware.

Screenshot 2023-05-15 at 20 11 36 Screenshot 2023-05-15 at 20 11 15 Screenshot 2023-05-18 at 00 02 40 Screenshot 2023-05-18 at 00 02 08 Screenshot 2023-05-18 at 00 01 21 Screenshot 2023-06-12 at 15 41 10 moon Screenshot 2023-05-18 at 00 00 24

Disclaimer

This log parser solution has been tested on UNIX systems only, Windows OS tests have not been conducted.

How to use it?

  1. To make it work simply run main.py.
  2. You will be asked to specify a main folder path, meaning a path to a folder where unpacked logs are situated. Example: Usr/milxss/logs
  3. To thank me, you can star this GitHub repository <3