Stealer malware is a type of malware that is designed to steal sensitive information from infected systems. When executed, it typically searches for and collects data such as browser-saved login credentials, credit card information, browser history and cookies, cryptocurrency wallet access, desktop files, gaming credentials among other technical instance’s information and it even takes desktop screenshots.
This information is then sent back to the attacker’s command and control server, where it can be used for malicious purposes such as identity theft, financial fraud, or espionage.
Stealer malware can be distributed through various means, including phishing emails, malicious websites, and infected software downloads. Once installed on a system, it can operate in the background without the user’s knowledge, collecting data and sending it back to the attacker.
Most antivirus software can’t detect stealer malware.
As a cyber security researcher I work with stealer malware logs on a daily basis, that's why I decided to facilitate my life and automate some of the processes.
This tool is designed to retrieve all the compromised accounts and credit cards from stealer malware logs. Made for cyber security educational purposes only.
Currently supports:
- Racoon,
- StealC,
- RedLine,
- Aurora,
- Meta,
- Paranoid checker logs,
- CINOSHI stealer/botnet/clipper/miner,
- [EXPERTLOGS STEALER],
- MoonLog (RedLine),
- other modified RedLine or Racoon family stealer malware.
This log parser solution has been tested on UNIX systems only, Windows OS tests have not been conducted.
- To make it work simply run main.py.
- You will be asked to specify a main folder path, meaning a path to a folder where unpacked logs are situated. Example: Usr/milxss/logs
- To thank me, you can star this GitHub repository <3