Skip to content

Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber security students and professionals.

Notifications You must be signed in to change notification settings

milxss/universal_stealer_log_parser

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

29 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

What is Stealer malware and how does it operate?

Stealer malware is a type of malware that is designed to steal sensitive information from infected systems. When executed, it typically searches for and collects data such as browser-saved login credentials, credit card information, browser history and cookies, cryptocurrency wallet access, desktop files, gaming credentials among other technical instance’s information and it even takes desktop screenshots.

This information is then sent back to the attacker’s command and control server, where it can be used for malicious purposes such as identity theft, financial fraud, or espionage.

Stealer malware can be distributed through various means, including phishing emails, malicious websites, and infected software downloads. Once installed on a system, it can operate in the background without the user’s knowledge, collecting data and sending it back to the attacker.

Most antivirus software can’t detect stealer malware.

As a cyber security researcher I work with stealer malware logs on a daily basis, that's why I decided to facilitate my life and automate some of the processes.

Universal stealer malware logs parser

This tool is designed to retrieve all the compromised accounts and credit cards from stealer malware logs. Made for cyber security educational purposes only.

Currently supports:

  • Racoon,
  • StealC,
  • RedLine,
  • Aurora,
  • Meta,
  • Paranoid checker logs,
  • CINOSHI stealer/botnet/clipper/miner,
  • [EXPERTLOGS STEALER],
  • MoonLog (RedLine),
  • other modified RedLine or Racoon family stealer malware.

Screenshot 2023-05-15 at 20 11 36 Screenshot 2023-05-15 at 20 11 15 Screenshot 2023-05-18 at 00 02 40 Screenshot 2023-05-18 at 00 02 08 Screenshot 2023-05-18 at 00 01 21 Screenshot 2023-06-12 at 15 41 10 moon Screenshot 2023-05-18 at 00 00 24

Disclaimer

This log parser solution has been tested on UNIX systems only, Windows OS tests have not been conducted.

How to use it?

  1. To make it work simply run main.py.
  2. You will be asked to specify a main folder path, meaning a path to a folder where unpacked logs are situated. Example: Usr/milxss/logs
  3. To thank me, you can star this GitHub repository <3

About

Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber security students and professionals.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages