KPOT Stealer is a "stealer" malware that focuses on stealing account information and other data from various software applications and services
References
1. 2020-04-19 Didier Stevens posted analysis of KPOT infostealer on the Infosec Handlers Diary blog "KPOT Analysis: Obtaining the Decrypted KPOT EXE"
These are samples to follow his analysis routine.
2. 2019-05-09 Proofpoint. New KPOT v2.0 stealer brings zero persistence and in-memory features to silently steal credentials
Download
1. http://contagio.deependresearch.org/crime/kpotstealer_win_samp.zip from Didier Stevens' post
2. http://contagio.deependresearch.org/crime/kpotstealer(proofpoint)_win_samp.zip - Proofpoint
Hashes
1. From Didier Stevens' post
MD5 56ad7b243511ee7398d43df7643dc904
SHA-1 ae5ab7798ca267b1265a0496c562f219821d17cf
SHA-256 3fd4aa339bdfee23684ff495d884aa842165e61af85fd09411abfd64b9780146
2. From Proofpoint
MD5 7d7667ddce8fd69a0fd50bb08c287d10
SHA-1 087fc3e9a082983ee6a2b25f0ccb09eb723e0f39
SHA-256 67f8302a2fd28d15f62d6d20d748bfe350334e5353cbdef112bd1f8231b5599d
MD5 45ddc687f88b45fc3fec79f9dc8b38e2
SHA-1 de37b748e0e32d96c31f469f9ba4ea4f11e3e78b
SHA-256 36dcd40aee6a42b8733ec3390501502824f570a23640c2c78a788805164f77cecontagio.deependresearch.org/crime/kpotstealer(proofpoint)_win_samp.zip
MD5 56ad7b243511ee7398d43df7643dc904
SHA-1 ae5ab7798ca267b1265a0496c562f219821d17cf
SHA-256 3fd4aa339bdfee23684ff495d884aa842165e61af85fd09411abfd64b9780146
2. From Proofpoint
MD5 7d7667ddce8fd69a0fd50bb08c287d10
SHA-1 087fc3e9a082983ee6a2b25f0ccb09eb723e0f39
SHA-256 67f8302a2fd28d15f62d6d20d748bfe350334e5353cbdef112bd1f8231b5599d
MD5 45ddc687f88b45fc3fec79f9dc8b38e2
SHA-1 de37b748e0e32d96c31f469f9ba4ea4f11e3e78b
SHA-256 36dcd40aee6a42b8733ec3390501502824f570a23640c2c78a788805164f77cecontagio.deependresearch.org/crime/kpotstealer(proofpoint)_win_samp.zip
More articles
- Pentest Tools Website
- Hacking Tools Software
- Pentest Tools
- Hackrf Tools
- Game Hacking
- New Hacker Tools
- Pentest Tools Framework
- World No 1 Hacker Software
- Pentest Tools For Mac
- Pentest Tools Website Vulnerability
- Beginner Hacker Tools
- Pentest Tools Free
- Hack Apps
- Pentest Reporting Tools
- Install Pentest Tools Ubuntu
- Hacker Tools Software
- Best Hacking Tools 2019
- Hacking App
- Hack Tools For Pc
- Hacker Tools 2020
- Hack Tools Online
- Hacker Tools Windows
- Hacking Tools Windows
- Pentest Tools Open Source
- Hacking Tools Online
- Hacking Apps
- Nsa Hack Tools
- Android Hack Tools Github
- Pentest Tools Linux
- Hacking Tools Github
- Pentest Tools Free
- New Hacker Tools
- Hacking Tools Kit
- Nsa Hack Tools
- Hacker Tools Online
- Hacking Tools Windows 10
- Pentest Reporting Tools
- Easy Hack Tools
- Hack Tools Download
- Hacking App
- Nsa Hacker Tools
- Top Pentest Tools
- Hack And Tools
- Hack Tools For Pc
- Pentest Tools Tcp Port Scanner
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Free Download
- Hack Tools Download
- Hacking Tools For Pc
- Hacking Tools Windows
- Hacks And Tools
- Hack Tools Mac
- Hacker Tools 2019
- Pentest Tools Website
- Hacking Tools For Mac
- Pentest Tools For Ubuntu
- Pentest Tools For Windows
- Hacker Tools Online
- What Is Hacking Tools
- Pentest Tools Subdomain
- Hacking Tools Github
- Hack Tools Mac
- Hack Tool Apk
- Growth Hacker Tools
- Hack Tools For Windows
- Hack Tools 2019
- Hacking Tools Online
- Hacker Tools 2019
- Growth Hacker Tools
- Tools Used For Hacking
- Github Hacking Tools
- Hacker Hardware Tools
- Hack And Tools
- Hacking Tools Windows 10
- Computer Hacker
- Hacker Tools List
- Nsa Hack Tools
- Hacking Tools Software
- Pentest Tools Framework
- Pentest Tools Framework
- Hacking Tools For Pc
- Hacker Tools Software
- New Hacker Tools
- Hacking Tools For Mac
- Underground Hacker Sites
- Pentest Automation Tools
- Hack Tools
- Hack Tools
- Kik Hack Tools
- Github Hacking Tools
歡迎蒞臨:https://ofa588.com/
沒有留言:
張貼留言