Making the decision to leave your current job and seek employment elsewhere can be an exciting time as you imagine how much better your life and career will be when you find that dream job. But that excitement can quickly turn to anger and despair when the job search tool you were using to help you land that dream job turned out to be a phishing attack that stole your identity.
Sadly, this isn’t just a hypothetical scenario, as the Zscaler ThreatLabZ team observed a scheme just like this come across the Zscaler cloud.
In August 2020, we observed network activity to a malicious site that used LinkedIn, a popular professional networking and job search site, as the lure for a social engineering scheme designed to steal a user’s credentials and spread malicious binaries. The bad actors also used a legitimate site hosting company, called Yola, to host the malicious content in an attempt to further look legitimate. The .NET-based binaries hosted on this site are related to the Agent Tesla malware and another previously unseen in-the-wild malware family. Its major functionality is information stealing and exfiltrating data through SMTP.
In this blog, we provide a detailed description of the tools, techniques, and procedures of this threat actor and the malicious binaries hosted on this site, as well as the credential phishing methods used.
LinkedIn-based social engineering
Figure 1 below shows the site that was set up by attackers on a legitimate website hosting server provided by Yola.
URL: hxxps://linkedlnnetworking.yolasite.com/
Figure 1: The main web page uses the LinkedIn logo but actually hosts the malicious content.
The web user interface of the site uses the well-known LinkedIn logo and poses as a recruitment company called “Jobsfinder 3ee,” which pretends to help the candidates find relevant jobs in various geographical regions around the world.
The download links on the web page lead to a ZIP archive containing the infostealer .NET-based binary.
Example URL:
hxxps://linkedlnnetworking.yolasite.com/resources/Download%20Job-Description%20%26%20company%20details.zip
The complete list of URLs used in this campaign, along with the filenames, is provided in the indicators of compromise (IoC) section later in the blog.
During the course of monitoring this threat actor, we noticed that the download links on the web page were updated frequently. On August 7, 2020, we observed that the original ZIP archives on the server were replaced with password-protected archives.
In addition to the malicious binaries hosted on this page, the user is also given the option to upload a CV. When the user clicks on this button, they are redirected to a credential phishing site.
Credential phishing site URL: hxxps://mpivn.org/LinkedIn-jobs/
This site spoofs the LinkedIn login page as shown in Figure 2.
Figure 2: The credential phishing page designed to look like a LinkedIn page.
This is a multistage social engineering attack. Once the credentials are entered by the user, a new web page is displayed (as shown in Figure 3), which prompts the user for the following information:
- Upload CV
- Country
- Mobile Number
Figure 3: This multistage LinkedIn phishing page asks for more personal information.
Threat attribution
This threat actor specifically targets users of LinkedIn. It was a low volume campaign targeting users in the healthcare and aviation industry sectors. In addition to the Agent Tesla malware, it also used a custom payload that we have not seen before. The following attributes of the threat actor's infrastructure indicate the focus is LinkedIn users.
- The main web page is designed to advertise itself as a job recruitment consulting company called Jobsfinder 3ee.
- The LinkedIn credential phishing pages are multistage and also require the users to upload their CV.
- In March 2018, a domain—jobsfinder3ee[.]online—was registered, which hosted a web page that spoofed LinkedIn on a WordPress site. We correlate the owner of that domain with a low confidence level to the campaign we discuss in this blog. The old webpage hosted at jobsfinder3ee[.]online is shown in Figure 4.
Figure 4: An old web page that spoofed LinkedIn and used the name "Jobsfinder 3ee", which is similar to the current campaign.
- All the Yandex-based email addresses that were used to exfiltrate the data using SMTP from the victim's machine, in this case, followed a specific pattern. The email addresses contained strings related to LinkedIn, such as: "linkedinjob" or "linkedin.office". Also, the passwords for these email addresses were randomly generated consisting of 16 lowercase characters. Based on this, we conclude that these email addresses were registered specifically for the LinkedIn campaign by the threat actor.
Payload technical analysis
For the purpose of technical analysis, we will consider the .NET binary with following details.
MD5 hash: 072462810ba6e5a7161b35b8535b55bd
Filename: quote08-04-20.exe
Since all the binaries in this campaign share the same packer, we first describe in detail the multiple stages of unpacking required to access the final payload.
Unpacking details
This binary spoofs the metadata data of a legitimate Comodo security application, as shown in Figure 5.
Figure 5: The packed file version information.
The resource section, as shown in Figure 6, contains multiple bitmap images that are later assembled together and decrypted to extract the next-stage payload, as explained later in the blog.
Figure 6: The assembly embedded as a byte array.
There is a .NET assembly embedded inside the main payload as a byte array as shown in Figure 7.
Figure 7: The byte array to be decoded and loaded by Assembly.Load().
This byte array is decoded and loaded at runtime using the Assembly.Load() method, as shown in Figure 8 and Figure 9. The decoding routine is simple. It subtracts the value 0x11 from each byte of the byte array to get the resulting .NET assembly, which will be loaded using reflection.
Figure 8: The decryption routine.
Figure 9: The decryption routine.
It creates a delegate to invoke the Main() method of the stage 1 decrypted DLL to carry out the further stages of unpacking.
It is interesting to note that the string, “Load”, which is used to invoke the Assembly.Load() method, is encoded, as shown in Figure 10.
Figure 10: The Load string built from split characters.
This was a similarity shared among all instances of packers used in the campaign where the “Load” string was split into individual characters and assembled at runtime. This could be done to bypass static analysis-based solutions that search for Assembly.Load() method in the decompiled code.
Stage 1 DLL
MD5 hash: 4c83623bbe9777daf64cb9ac94ec0bde
This DLL is a 32-bit .NET binary that spoofs itself as a legitimate application from VMWare, as shown in Figure 11. It is important to note that the stage 1 DLL was the same for all the instances of the .NET binaries observed in this campaign.
Figure 11: The Stage 1 version information.
This DLL contains another encoded .NET assembly embedded inside, which will be decoded and loaded at runtime, as shown in Figure 12.
Figure 12: The payload has a byte array similar to the first packer.
Stage 2 DLL
The stage 2 DLL, which is decoded and loaded by the stage 1 DLL, is responsible for extracting the metadata and the final payload from the multiple bitmap images that are stored in the resource section.
The main method inside this assembly is called ReadMRes() with the name "resourceLib," which extracts the relevant information from the bitmap images, as shown in Figure 13.
Figure 13: The ReadMRes responsible for decryption.
The result of the above subroutine is an array of key-value pairs, as shown in Figure 14.
Figure 14: The dictionary of key value pairs decrypted earlier.
This array contains useful metadata that is used by the payload in later stages for choosing the Windows registry key path, the name used for persistence, and the name of the dropped binary.
This array also contains a gzip compressed payload in element index: 15. Figure 15 shows the relevant code that will decompress it.
Figure 15: Decompressing the gzip compressed data.
After gzip decompression, we obtain a .NET payload that is obfuscated using ConfuserEx. Once we deobfuscate the ConfuserEx protection, the main method of the final payload is shown in Figure 16.
Figure 16: Entry point of final payload (Agent Tesla).
The final unpacked payload, in this case, is Agent Tesla. Since Agent Tesla is a well-known password stealer spyware, we will not be describing its technical functionalities in detail in this blog.
String decryption
All the strings are encrypted using the RijndaelManaged algorithm with a key size of 256-bit and an initialization vector size of 128-bit.
Figure 17 shows the string decryption routine that accepts an integer as an argument and is used to calculate the index of the encrypted string in an object array.
Figure 17: The RijndaelManaged-based string decryption routine.
Figure 18 shows the object array containing an array of integers with the following format:
32 bytes from offset 0 - Decryption key for Rijndael algorithm.
16 bytes from offset 32 - Initialization vector.
Remaining bytes - Encrypted String.
Figure 18: The array containing encrypted strings data.
Based on this, we can write a string decryptor for the final payload. The complete list of decrypted strings are mentioned in Appendix II.
Custom malware analysis
MD5: f89b4dff6e126e9a5f0a64d590f7b42e
In addition to Agent Tesla, we also encountered another payload previously unseen in the wild. It is a very basic information stealer capable of stealing keylogs, clipboard data, and screenshots. It sends stolen data to an embedded yandex.com email address. All layers of the packer used in the sample are the same as the ones used in Agent Tesla samples.
The unpacked final payload is signed with a certificate from “DESKTOP-K179H9L\GO TECH COMPUTER” as shown in Figure 19.
Figure 19: The digital certificate used to sign the custom malware.
It contains the following PDB string:
C:\Users\GO TECH COMPUTERS\source\repos\WindfastStrap\WindfastStrap\obj\Debug\WindfastStrap.pdb
This information stealer's activity includes:
- Making heavy use of timers for various activities.
- Dropping and running a binary called chrom.exe from the resources section.
- Deleting all the files from C:\Users\Public\Downloads and creating this path if it does not exist already.
- Creating a Windows registry run key with the name, "Windows Application" for the purpose of persistence.
- Creating timers for stealing keylogs, clipboard data, and screenshots.
- Screenshots are temporarily saved in the path: C:\Users\Public\Downloads before they are exfiltrated with the name formatted as {MM-dd-yyyy hh:mm:ss}.jpg.
- Killing the following processes:
- taskmgr
- regedit
- Outlook
- Foxmail
- Emailing subject lines used for exfiltrating different types of data, which are described below:
- Screenshots: SC_{ComputerName}_WD-
- Keylogs: KL_{ComputerName}_WD-
- Clipboard : CopiedText_{ComputerName}_WD-{WindowsVersion}
- e.g SC_MyPC_WD-8
Figure 20: The function responsible for sending saved screenshots over SMTP.
Variants of this sample were first seen on Virustotal in June 2020. The initial samples were distributed without any packer.
All older variants were signed by the same signer and have similar PDB strings containing the username “GO TECH COMPUTERS” in the PDB path. Below are the other PDB strings observed.
- C:\Users\GO TECH COMPUTERS\source\repos\PDFExtra\PDFExtra\obj\Debug\PDFExtra.pdb
- C:\Users\GO TECH COMPUTERS\source\repos\excel++\excel++\obj\Debug\excel++.pdb
In some variants, the subject lines used are slightly different than this payload as described below.
- COPY & PASTE @ MYPC
- SCREENSHOT Dotz @ MYPC
- KEYBOARD @ MYPC
Dropped binary - chrom.exe
The dropped binary called chrom.exe in this case is a command line executable that uses the Google Chrome browser's icon. It is run by this stealer with a hidden window. Most of the activities of this executable are related to building commands and executing them using compsec or cmd.exe.
It creates the following directories:
- %temp%/xtmp
- Is64.txt (0 32 bit or 1 64 bit)
- is64.bat (put 1 or 0 in is64.txt based on existence of folder)
- is64.fil (contains cmd.exe path)
- %temp%/efolder
Upon execution, it shows the following message:
Figure 21: The dropped payload runs in the background in a hidden window.
Since it runs in a hidden window, it just displays the above message and waits for a keypress event.
Zscaler Cloud Sandbox detection
Figure 22 shows the Zscaler Cloud Sandbox successfully detecting this .NET-based threat.
Figure 22. This threat was successfully detected by the Zscaler Cloud Sandbox.
In addition to sandbox detections, Zscaler’s multilayered cloud security platform detects indicators at various levels, as seen here:
Conclusion
This threat actor is targeting LinkedIn users, and has built an entire web and email infrastructure specifically for it. As always, users should be cautious when receiving emails out of the blue, even if those emails appear to be related to something you are interested in, such as help finding a new job. And always be sure to only enter credentials or upload your CV on verified websites. If the site comes to you from an unsolicited email, be wary.
The Zscaler ThreatLabZ team will continue to monitor this campaign, as well as others, to help keep our customers safe.
MITRE ATT&CK TTP Mapping
ID |
Tactic |
Technique |
T1566 |
Phishing |
LinkedIn phishing |
T1204.002 |
User Execution: Malicious File |
User extracts zip file and executes the binary. |
T1547.001 |
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
Payload sets the run registry key for persistence. |
T1140 |
Deobfuscate/Decode Files or Information |
Strings and other data are obfuscated in the payload. |
T1202 |
Indirect Command Execution |
cmd.exe is used for execution of some commands. |
T1036.001 |
Masquerading: Invalid Code Signature |
Masquerading Comodo digital signatures. |
T1036.005
|
Masquerading: Match Legitimate Name or Location |
Using the Job and CV related filenames and the use of LinkedIn string in domain name. |
T1027.002
|
Obfuscated Files or Information: Software Packing |
Payloads are packed with a multilayer packer.
|
T1497 |
Virtualization/Sandbox Evasion |
Agent Tesla has AntiVM capabilities |
T1555.003
|
Credentials from Password Stores: Credentials from Web Browsers |
Agent Tesla can steal credentials from Web browsers |
T1056.001 |
Input Capture: Keylogging |
Both the payloads can capture keystrokes |
T1539 |
Steal Web Session Cookie |
Agent Tesla can steal cookies |
T1010 |
Application Window Discovery |
One of Agent Tesla capabilities |
T1057 |
Process Discovery |
One of Agent Tesla capabilities |
T1518 |
Software Discovery |
One of Agent Tesla capabilities |
T1082 |
System Information Discovery |
One of Agent Tesla capabilities |
T1016 |
System Network Configuration Discovery |
One of Agent Tesla capabilities |
T1033 |
System Owner/User Discovery |
One of Agent Tesla capabilities |
T1124 |
System Time Discovery |
One of AgentTesla capabilities |
T1125 |
Video Capture |
One of Agent Tesla capabilities |
T1113 |
Screen Capture |
One of Agent Tesla capabilities |
T1123 |
Audio Capture |
One of Agent Tesla capabilities |
T1115 |
Clipboard Data |
Both payloads steal clipboard text. |
T1005 |
Data from Local System |
Both payloads steal data from local system. |
T1119 |
Automated Collection |
Both payloads do automated collection. |
T1029 |
Scheduled Transfer |
Both payloads exfiltrate data at regular intervals. |
T1041
|
Exfiltration Over C2 Channel
|
Both payloads exfiltrate over their C2 channel |
T1020 |
Automated Exfiltration |
Both payloads do automated exfiltration |
T1071.003 |
Application Layer Protocol: Mail Protocols |
Both payloads use SMTP protocol |
Indicators of compromise (IOCs)
Hashes
f89b4dff6e126e9a5f0a64d590f7b42e
73ee4b60893b0ccc20079882aae66e2f
39648125d1ea711fee091b5ee58eb533
072462810ba6e5a7161b35b8535b55bd
940db8fcba320925e423b44a22e703f1
78d029254cb2350260967feb983d487f
a29a4aea13be816b7929bf103136887d
830bbf1855da3a145831ec55d1c37d17
PDB Strings
C:\Users\GO TECH COMPUTERS\source\repos\WindfastStrap\WindfastStrap\obj\Debug\WindfastStrap.pdb
C:\Users\GO TECH COMPUTERS\source\repos\PDFExtra\PDFExtra\obj\Debug\PDFExtra.pdb
C:\Users\GO TECH COMPUTERS\source\repos\excel++\excel++\obj\Debug\excel++.pdb
Network IOCs
linkedlnnetworking.yolasite[.]com
mpivn[.]org/LinkedIn-jobs
Filenames
Click here and upload your CV.exe
Click here and upload your CV.zip
Job Description & company Infomations.exe
Job Description & company Infomations.zip
QUOTE08-04-20.exe
QUOTE08-04-20.zip
Appendix I
Table of extracted email addresses and passwords
MD5 |
|
Password |
8cb05c44406adbe13690d816759658da |
<redacted> | |
f4755749ad038edc337c3b23c7b065f5 |
<redacted> | |
73ee4b60893b0ccc20079882aae66e2f |
<redacted> | |
072462810ba6e5a7161b35b8535b55bd |
<redacted> | |
940db8fcba320925e423b44a22e703f1 |
<redacted> | |
78d029254cb2350260967feb983d487f |
<redacted> |
Appendix II
Decrypted strings
Below is the complete list of decrypted strings which were extracted from samples used in this campaign.
-convert xml1 -s -o "
<b>]</b> <font color="#000000">(
"encrypted_key":"(.*?)"
%PostURL%
%ftphost%/
%ftppassword%
%ftpuser%
%insregname%
%startupfolder%
%urlkey%
&
>
<
"
)</font></font>
.html
.jpeg
.tmp
.zip
/log.tmp
00000000-0000-0000-0000-000000000000
154E23D0-C644-4E6F-8CE6-5069272F999F
1f2aa2d7-39c9-4d9f-ba17-371040cce426
2F1A6504-0641-44CF-8BB5-3612D865F2E5
360 Browser
360Chrome\Chrome\User Data
3C886FF3-2669-4AA2-A8FB-3F6759A77548
3CCD5499-87A8-4B10-A215-608888DD3B55
3E0E35BE-1B77-43E7-B873-AED901B6275B
4BF4C442-9B8A-41A0-B380-DD4A704DDB28
720d6d91-c1cd-4df7-a390-4b4adfffb8d0
77BC582B-F0A6-4E15-4E80-61736B6F3B29
7Star
7Star\7Star\User Data
:Zone.Identifier
;Anonymous=
;Password=
;Port=
;Server=
;User=
</Host>
</Name>
</Pass>
</Password>
</Port>
</User>
</b>
</data>
</font>
</html>
</name>
</password>
</protocol>
</server_ip>
</server_port>
</server_user_name>
</server_user_password>
</string>
<Host>
<Name>
<Pass encoding="base64">
<Pass>
<Password>
<Port>
<Server>
<User>
<account>
<array>
<br>
<data>
<dict>
<font color="#00b1ba"><b>[
<font color="#00ba66">↓</font>
<font color="#00ba66">←</font>
<font color="#00ba66">→</font>
<font color="#00ba66">↑</font>
<font color="#00ba66">{ALT+F4}</font>
<font color="#00ba66">{ALT+TAB}</font>
<font color="#00ba66">{BACK}</font>
<font color="#00ba66">{CAPSLOCK}</font>
<font color="#00ba66">{CTRL}</font>
<font color="#00ba66">{DEL}</font>
<font color="#00ba66">{END}</font>
<font color="#00ba66">{ENTER}</font>
<font color="#00ba66">{ESC}</font>
<font color="#00ba66">{F10}</font>
<font color="#00ba66">{F11}</font>
<font color="#00ba66">{F12}</font>
<font color="#00ba66">{F1}</font>
<font color="#00ba66">{F2}</font>
<font color="#00ba66">{F3}</font>
<font color="#00ba66">{F4}</font>
<font color="#00ba66">{F5}</font>
<font color="#00ba66">{F6}</font>
<font color="#00ba66">{F7}</font>
<font color="#00ba66">{F8}</font>
<font color="#00ba66">{F9}</font>
<font color="#00ba66">{HOME}</font>
<font color="#00ba66">{Insert}</font>
<font color="#00ba66">{NumLock}</font>
<font color="#00ba66">{PageDown}</font>
<font color="#00ba66">{PageUp}</font>
<font color="#00ba66">{TAB}</font>
<font color="#00ba66">{Win}</font>
<hr>
<html>
<name>
<password>
<protocol>
<server>
<server_ip>
<server_port>
<server_user_name>
<server_user_password>
<string>
ABCDEF
ALLUSERSPROFILE
APPDATA
Account
Accounts
All Users
Amigo
Amigo\User Data
Application:
Application:
AuthTagLength
Backend=([A-z0-9\/\.-]+)
Becky!
BlackHawk
Brave
Brave Browser
BraveSoftware\Brave-Browser\User Data
CPU:
CatalinaGroup\Citrio\User Data
CentBrowser
CentBrowser\User Data
ChainingMode
ChainingModeGCM
Chedot
Chedot\User Data
Chrome
Chromium
Chromium\User Data
Citrio
ClawsMail
Close
CocCoc
CocCoc\Browser\User Data
Coccoc
Comodo Dragon
Comodo\Dragon\User Data
Computer Name:
Cookies
Cool Novo
CoolNovo
Coowon
Coowon\Coowon\User Data
Copied Text:
Copy
CoreFTP
CreateDecryptor
CyberFox
Data
DataDir
DecryptTripleDes
Dispose
DynDNS
DynDNS\Updater\config.dyndns
E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
Edge Chromium
Elements Browser
Elements Browser\User Data
EmailAddress
EncPassword
EndsWith
Epic Privacy
Epic Privacy Browser
Epic Privacy Browser\User Data
Eudora
Executable
FTP Navigator
FTPCommander
FTPGetter
Falkon Browser
False
Fenrir Inc\Sleipnir5\setting\modules\ChromiumViewer
FileZilla
Firefox
FlashFXP
Flock
Flock Browser
Folder.lst
Foxmail
FoxmailPath
GetBytes
HKEY_CURRENT_USERSoftwareFTPWareCOREFTPSites
HKEY_CURRENT_USER\SOFTWARE\Vitalwerks\DUC
HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
HKEY_CURRENT_USER\Software\FTPWare\COREFTP\Sites\
HKEY_CURRENT_USER\Software\Paltalk\
HKEY_CURRENT_USER\Software\Qualcomm\Eudora\CommandLine
HKEY_CURRENT_USER\Software\RimArts\B2\Settings
HKEY_LOCAL_MACHINE\SOFTWARE\Vitalwerks\DUC
HOST
HTTP Password
Host
HostName
IE/Edge
IMAP Password
INSERT INTO CONFIG VALUES('AccountController','
INTEGER
IPEnabled
IceCat
IceDragon
IncomingServer
IndexOf
InstancesOf
Internet Download Manager
Iridium Browser
Iridium\User Data
IterationCount
JDownloader
K-Meleon
KeyDataBlob
Kometa
Kometa\User Data
Length
Liebao Browser
Load
Login Data
MM/dd/yyyy HH:mm:ss
MacAddress
MailAddress
Major
MapleStudio\ChromePlus\User Data
Microsoft Primitive Provider
Minor
Mode
Mozilla/5.0 (Windows; U; Windows NT 6.1; ru; rv:1.9.2.3) Gecko/20100401 Firefox/4.0 (.NET CLR 3.5.30729)
NO-IP
Name
Name=
No Password
None
OBJECTIDENTIFIER
OCTETSTRING
OSFullName:
ObjectLength
Open VPN
Opera
Opera Browser
Opera Mail
Opera Software\Opera Stable
Orbitum
Orbitum\User Data
Outlook
POP3 Password
POP3Host
POP3Password
POPPass
POST
PWD=
Padding
PaleMoon
Paltalk
PassWd
Password
Password:
Password:
Path=([A-z0-9\/\.\-]+)
Pidgin
PocoMail
PopPassword
Port
PortNumber
Postbox
Profile
Programfiles(x86)
Psi/Psi+
PublicKeyFile
QIP Surf
QIP Surf\User Data
QQ Browser
RAM:
Read
RegRead
Replace
ReturnAddress
SELECT * FROM Win32_Processor
SEQUENCE {
SMTP
SMTP Password
SMTP Server
SMTPHost
SMTPPass
SMTPServer
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
SRWare Iron
STOR
Safari Browser
SavePasswordText
SchemaId
SeaMonkey
SerialNumber
Server
Settings
Sleipnir 6
SmartFTP
SmtpPassword
SmtpServer
Software\DownloadManager\Passwords\
Software\IncrediMail\Identities\
Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Windows NT\CurrentVersion\Windows
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Windows\CurrentVersion\Run
Software\OpenVPN-GUI\configs
Software\OpenVPN-GUI\configs\
Software\Paltalk
Sputnik
Sputnik\Sputnik\User Data
Substring
SystemDrive
Tencent\QQBrowser\User Data
TheBat
Thunderbird
Time:
Torch Browser
Torch\User Data
TransformFinalBlock
Trillian
True
Type
UC Browser
UCBrowser\
UNIQUE
URL:
URL:
USERPROFILE
USERname
Unknown
Uran
User
User Name:
UserName
Username
Username:
Username:
Value
Version
Vivaldi
Vivaldi\User Data
WS_FTP
WScript.Shell
WaterFox
Web Credentials
Win32_BaseBoard
Win32_NetworkAdapterConfiguration
WinMgmts:
WinSCP
Windows Credential Picker Protector
Windows Credentials
Windows Domain Certificate Credential
Windows Domain Password Credential
Windows Extended Credential
Windows Secure Note
Windows Web Password Credential
Write
Writing is not allowed
Writing is not alowed
Yandex
Yandex Browser
Yandex\YandexBrowser\User Data
[PRIVATE KEY LOCATION: "{0}"]
[^\u0020-\u007F]
\"(hostname|encryptedPassword|encryptedUsername)":"(.*?)"
\%insfolder%\
\%insfolder%\%insname%
\.purple\accounts.xml
\360Chrome\Chrome\User Data
\8pecxstudios\Cyberfox\
\Account.CFN
\Account.stg
\Accounts\Account.rec0
\Accounts_New
\Apple Computer\Preferences\keychain.plist
\Cbc
\Claws-mail
\Common Files\Apple\Apple Application Support\plutil.exe
\Comodo\IceDragon\
\CoreFTP\sites.idx
\Default\
\Default\EncryptedStorage
\Default\Login Data
\EncryptedStorage
\FTP Navigator\Ftplist.txt
\FTPGetter\servers.xml
\FileZilla\recentservers.xml
\FlashFXP\3quick.dat
\Flock\Browser\
\Google\Chrome\User Data
\Google\Chrome\User Data\
\Ipswitch\WS_FTP\Sites\ws_ftp.ini
\Iridium\User Data
\K-Meleon\
\Local State
\Login Data
\Mailbox.ini
\Microsoft\Edge\User Data
\Moonchild Productions\Pale Moon\
\Mozilla\Firefox\
\Mozilla\SeaMonkey\
\Mozilla\icecat\
\NETGATE Technologies\BlackHawk\
\OpenVPN\config\
\Opera Mail\Opera Mail\wand.dat
\Pocomail\accounts.ini
\Postbox\
\Psi+\profiles
\Psi\profiles
\SmartFTP\Client 2.0\Favorites\Quick Connect\
\SmartFTP\Client 2.0\Favorites\Quick Connect\*.xml
\Storage\
\The Bat!
\Thunderbird\
\Trillian\users\global\accounts.dat
\VirtualStore\Program Files (x86)\Foxmail\mail\
\VirtualStore\Program Files\Foxmail\mail\
\Waterfox\
\accountrc
\accounts.xml
\browsedata.db
\cftp\Ftplist.txt
\clawsrc
\falkon\profiles\
\fixed_keychain.xml"
\jDownloader\config\database.script
\mail\
\passwordstorerc
\settings.ini
\tmpG
a102
abcçdefgğhıijklmnoöpqrsştuüvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
account
address
appdata
application/x-www-form-urlencoded
application/zip
auth-data
autofill
b80adc15-8437-481a-99c8-560b4fb51daa
blob0
category
control
cookies.sqlite
created=
current
discord
encryptedPassword
encryptedUsername
entries
entropy
global-salt
gmail
hack
hostname
http://DynDns.com
http://GrWLaB.com
image/jpg
incredimail
item1
item2
journal
key3.db
key4.db
liebao\User Data
logins
logins.json
master_passphrase_pbkdf2_rounds=(.+)
master_passphrase_salt=(.+)
metaData
movie
moz_logins
name
nssPrivate
objects
opera:
origin_url
pAuthenticatorElement
pIdentityElement
pPackageSid
pResourceElement
pass=
passkey0
password
password-check
password=
password_value
porn
port=
processorID
profiles.ini
programfiles
programfiles(x86)
qxrultabnwnjqwvy
remote
signons.sqlite
signons3.txt
skype
smtp
smtp.yandex.com
smtp_server
startProfile="([A-z0-9\/\.]+)"
startProfile=([A-z0-9\/\.]+)
str2
str3
t6KzXhCh
table
text/html
uCozMedia
uCozMedia\Uran\User Data
uninstall
use_master_passphrase=(.+)
user=
username
username=
username_value
webpanel
win32_processor
wow_logins
yyyy-MM-dd HH:mm:ss
yyyy_MM_dd_HH_mm_ss
{(.*),(.*)}(.*)
{0:X2}