This post is by a banned member (tutu004) - Unhide
25 May, 2020 - 03:58 AM
Reply
[font][font]good job[/font][/font]
This post is by a banned member (twinx56) - Unhide
25 May, 2020 - 05:35 AM
Reply
(24 November, 2019 - 10:54 AM)agcash6 Wrote: Show More[font][font]Description du voleur AB[/font][/font]
[font][font]L'AB Stealer est une menace utilisée pour collecter les mots de passe des victimes et d'autres informations. [/font][font]L'AB Stealer est utilisé pour collecter des informations et appartient à une grande catégorie de menaces qui mènent à bien ces attaques. [/font][font]L'AB Stealer existe depuis un certain temps et des traces de l'AB Stealer existent depuis avril 2016. Depuis sa première apparition, l'AB Stealer a été mis à jour régulièrement. [/font][font]Les analystes de logiciels malveillants n'ont pas déterminé qui est responsable du développement et de la publication d'AB Stealer exactement, mais il semble que leur langue principale soit l'arabe et que l'AB Stealer soit distribué sur le Web sombre en tant que générateur de menaces. [/font][font]L'AB Stealer dispose d'un panneau Web relativement simple à utiliser et qui a été publié dans diverses versions personnalisées depuis sa sortie initiale.[/font][/font]
[font][font]Utilisation de l'alphabet pour nommer un schéma nuisible[/font][/font]
[font][font]L'AB Stealer, bien que simple, semble avoir toutes les fonctionnalités avancées qui ont été vues dans les chevaux de Troie de collecte d'informations plus sophistiquées. [/font][font]L'AB Stealer est installé par des cybercriminels qui utilisent diverses techniques pour pirater les ordinateurs des victimes. [/font][font]AB Stealer utilise un composant enregistreur de frappe pour garder une trace de l'activité de la victime sur l'ordinateur infecté. [/font][font]L'AB Stealer injectera un mauvais code sur l'ordinateur de la victime qui lui permettra de collecter les mots de passe des banques en ligne et des sites Web sécurisés. [/font][font]AB Stealer prendra des captures d'écran de l'ordinateur infecté et les enverra à un emplacement distant et peut s'exécuter même avec des privilèges limités sur l'ordinateur infecté. [/font][font]AB Stealer peut également extraire les mots de passe enregistrés dans les navigateurs Web les plus couramment utilisés sur le système d'exploitation Windows.[/font][/font]
[font][font]Détails supplémentaires sur le voleur AB et son attaque[/font][/font]
[font][font]Plutôt que d'avoir les serveurs de commande et de contrôle d'AB Stealer sur un emplacement spécifique, les criminels utiliseront des sites Web et des serveurs compromis comme serveurs de commande et de contrôle d'AB Stealer. [/font][font]Après avoir profité de diverses vulnérabilités, telles que des comptes RDP faibles, les cybercriminels peuvent transformer n'importe quel ordinateur en serveur de commande et de contrôle virtuellement, leur permettant d'éviter la détection et d'être traqués par les personnes responsables de l'attaque d'AB Stealer. [/font][font]Pour prévenir ces attaques, les chercheurs en sécurité informatique conseillent aux utilisateurs d'ordinateurs d'éviter les spams, de s'assurer que tous les logiciels et plates-formes de sites Web sont entièrement mis à jour et d'installer un programme de sécurité solide. [/font][font]Selon les rapports des développeurs d'AB Stealer eux-mêmes, voici les caractéristiques de l'AB Stealer lui-même,[/font][/font]
[font][font]Nom du [/font][font]fichier: AbBuild v.1.0.exe [/font][/font]
[font][font]Taille du [/font][font]fichier: 80,50 kB [/font][/font]
[font][font]Date: 24/07/2016 17: 16: 52 [/font][/font]
[font][font]MD5: 9e44c10307aa8194753896ecf8102167 [/font][/font]
[font][font]SHA1: 6e47601618ef2e2dfb1fed837ba7082cd7a427f4 [/font][/font]
[font][font]Statut: Infected [/font][/font]
[font][font]Note: 20/35 [/font][/font]
[font][font]Ad-Aware - Trojan.GenericKD.3404642 [/font][/font]
[font][font]A -Squared - Trojan.GenericKD.3404642 (B) [/font][/font]
[font][font]Avast - Le fichier est propre [/font][/font]
[font][font]AVG Gratuit - Cheval de Troie PSW.MSIL.BBDK [/font][/font]
[font][font]AntiVir (Avira) - TR / Keylog.exvk [/font][/font]
[font][font]BitDefender - Trojan.GenericKD.3404642 [/font][/font]
[font][font]BullGuard - Gen: Variant.Razy .82094 [/font][/font]
[font][font]Clam Antivirus - Le fichier est propre [/font][/font]
[font][font]COMODO Internet Security - Le fichier est propre [/font][/font]
[font][font]Dr.Web - Le fichier est propre [/font][/font]
[font][font]ESET NOD32 - Trojan.MSIL / Spy.Keylogger.AVQ [/font][/font]
[font][font]eTrust-Vet - Trojan.GenericKD.3404642[/font][/font]
[font][font]FortiClient - Le fichier est propre [/font][/font]
[font][font]F-PROT Antivirus - Le fichier est propre [/font][/font]
[font][font]F-Secure Internet Security - Trojan.GenericKD.3404642 [/font][/font]
[font][font]G Data - Trojan.GenericKD.3404642 IKARUS [/font][/font]
[font][font]Security - Trojan-PWS.MSIL [/font][/font]
[font][font]K7 Ultimate - Spyware (004bcf421) [/font][/font]
[font][font]Kaspersky Antivirus - HEUR: Trojan.Win32.Generic [/font][/font]
[font][font]McAfee - Le fichier est propre [/font][/font]
[font][font]MS Security Essentials - TrojanSpy: Win32 / Skeeyah.A! Rfn [/font][/font]
[font][font]NANO Antivirus - Le fichier est propre [/font][/font]
[font][font]Norman - Trojan.GenericKD.3404642 [/font][/font]
[font][font]Norton Antivirus - Le fichier est propre [/font][/font]
[font][font]Panda CommandLine - Trj / GdSda .A [/font][/font]
[font][font]Panda Security - Suspicious [/font][/font]
[font][font]Quick Heal Antivirus - EE: Malware.GenericKD.3404642 [/font][/font]
[font][font]Solo Antivirus - Le fichier est propre [/font][/font]
[font][font]Sophos - Mal / Generic-S [/font][/font]
[font][font]SUPERAntiSpyware - Le fichier est propre[/font][/font]
[font][font]Trend Micro Internet Security - Le fichier est propre [/font][/font]
[font][font]Twister Antivirus - Le fichier est propre [/font][/font]
[font][font]VBA32 Antivirus - Le fichier est propre [/font][/font]
[font][font]VIPRE - Trojan.Win32.Generic = 21BT [/font][/font]
[font][font]Zoner AntiVirus - Le fichier est propre [/font][/font]
[font][font]CECI EST POUR USAGE PERSONNEL UNIQUEMENT [/font][/font]
[font][font]Vidéo d'instruction incluse avec le téléchargement [/font][/font]
[font][font]Veuillez laisser des commentaires[/font][/font] [font][font]ahok cool on va test vfg[/font][/font]
This post is by a banned member (Tomcat999) - Unhide
09 June, 2020 - 02:49 PM
Reply
This post is by a banned member (XYZEL12345) - Unhide
20 June, 2020 - 10:39 PM
Reply
This post is by a banned member (aiyotv) - Unhide
21 June, 2020 - 12:37 AM
Reply
This post is by a banned member (ihebab) - Unhide
21 June, 2020 - 06:17 AM
Reply
I test this thanks
Make Your Dreams or Die in Peace
+ REP l LIKES +
would you like to return?
This post is by a banned member (Wazee01) - Unhide
04 July, 2020 - 05:27 PM
Reply
(24 November, 2019 - 10:54 AM)agcash6 Wrote: Show MoreAB Stealer Description
The AB Stealer is a threat that is used to collect the victims' passwords and other information. The AB Stealer is used to collect information and belongs to a large category of threats that carry out these attacks. The AB Stealer has been around for a while, and traces of the AB Stealer have existed since April 2016. Since its first appearance, the AB Stealer has been updated regularly. Malware analysts have not determined who is responsible for developing and releasing the AB Stealer exactly, but it seems that their primary language is Arabic and that the AB Stealer is being distributed on the Dark Web as a threat builder. The AB Stealer features a Web panel that is relatively simple to use and has been released in various custom versions since its initial release. PC security researchers consider that threats like the AB Stealer represent a real danger to the victims' data and information, and steps should be taken immediately if they suspect that their computers have become infected with a threat like the AB Stealer.
Using the Alphabet to Name a Harmful Scheme
The AB Stealer, although simple, seems to have all of the advanced features that have been seen in more sophisticated information collecting Trojans. The AB Stealer is installed by cybercrooks that use various techniques to hack into the victims' computers. The AB Stealer uses a keylogger component to keep track of the victim's activity on the infected computer. The AB Stealer will inject a bad code onto the victim's computer that allows the AB Stealer to collect passwords for online banks and secure websites. The AB Stealer will take screenshots of the infected computer and send them to a remote location and can run even with limited privileges on the infected computer. The AB Stealer also can extract passwords saved in the most commonly used Web browsers on the Windows operating system.
Additional Details about the AB Stealer and Its Attack
Rather than having the AB Stealer's Command and Control servers on a specific location, criminals will use compromised websites and servers as the AB Stealer's Command and Control servers. After taking advantage of various vulnerabilities, such as weak RDP accounts, the cybercrooks can turn any computer into a Command and Control server virtually, allowing them to avoid detection and being tracked down by the people responsible for the AB Stealer attack. To prevent these attacks, PC security researchers advise computer users to avoid spam email messages, ensure that all software and website platforms are fully updated, and install a strong security program. According to reports from the AB Stealer's developers themselves, the following are the characteristics of the AB Stealer itself, as well as how it is detected by 35 different anti-virus programs on the market:
Filename: AbBuild v.1.0.exe
Filesize: 80,50 kB
Date: 2016-07-24 17 : 16 : 52
MD5: 9e44c10307aa8194753896ecf8102167
SHA1: 6e47601618ef2e2dfb1fed837ba7082cd7a427f4
Status: Infected
Rate: 20/35
Ad-Aware - Trojan.GenericKD.3404642
A-Squared - Trojan.GenericKD.3404642 (B)
Avast - File is clean
AVG Free - Trojan horse PSW.MSIL.BBDK
AntiVir (Avira) - TR/Keylog.exvk
BitDefender - Trojan.GenericKD.3404642
BullGuard - Gen:Variant.Razy.82094
Clam Antivirus - File is clean
COMODO Internet Security - File is clean
Dr.Web - File is clean
ESET NOD32 - Trojan.MSIL/Spy.Keylogger.AVQ
eTrust-Vet - Trojan.GenericKD.3404642
FortiClient - File is clean
F-PROT Antivirus - File is clean
F-Secure Internet Security - Trojan.GenericKD.3404642
G Data - Trojan.GenericKD.3404642
IKARUS Security - Trojan-PWS.MSIL
K7 Ultimate - Spyware ( 004bcf421 )
Kaspersky Antivirus - HEUR:Trojan.Win32.Generic
McAfee - File is clean
MS Security Essentials - TrojanSpy:Win32/Skeeyah.A!rfn
NANO Antivirus - File is clean
Norman - Trojan.GenericKD.3404642
Norton Antivirus - File is clean
Panda CommandLine - Trj/GdSda.A
Panda Security - Suspicious
Quick Heal Antivirus - EE:Malware.GenericKD.3404642
Solo Antivirus - File is clean
Sophos - Mal/Generic-S
SUPERAntiSpyware - File is clean
Trend Micro Internet Security - File is clean
Twister Antivirus - File is clean
VBA32 Antivirus - File is clean
VIPRE - Trojan.Win32.Generic=21BT
Zoner AntiVirus - File is clean
THIS IS FOR PERSONAL USE ONLY
Instructional video included with download
Please leave feedback
gg forthis men it's ok for this
This post is by a banned member (nomixjusttapef) - Unhide
15 July, 2020 - 09:36 PM
Reply
(24 November, 2019 - 10:54 AM)agcash6 Wrote: Show MoreAB Stealer Description
The AB Stealer is a threat that is used to collect the victims' passwords and other information. The AB Stealer is used to collect information and belongs to a large category of threats that carry out these attacks. The AB Stealer has been around for a while, and traces of the AB Stealer have existed since April 2016. Since its first appearance, the AB Stealer has been updated regularly. Malware analysts have not determined who is responsible for developing and releasing the AB Stealer exactly, but it seems that their primary language is Arabic and that the AB Stealer is being distributed on the Dark Web as a threat builder. The AB Stealer features a Web panel that is relatively simple to use and has been released in various custom versions since its initial release. PC security researchers consider that threats like the AB Stealer represent a real danger to the victims' data and information, and steps should be taken immediately if they suspect that their computers have become infected with a threat like the AB Stealer.
Using the Alphabet to Name a Harmful Scheme
The AB Stealer, although simple, seems to have all of the advanced features that have been seen in more sophisticated information collecting Trojans. The AB Stealer is installed by cybercrooks that use various techniques to hack into the victims' computers. The AB Stealer uses a keylogger component to keep track of the victim's activity on the infected computer. The AB Stealer will inject a bad code onto the victim's computer that allows the AB Stealer to collect passwords for online banks and secure websites. The AB Stealer will take screenshots of the infected computer and send them to a remote location and can run even with limited privileges on the infected computer. The AB Stealer also can extract passwords saved in the most commonly used Web browsers on the Windows operating system.
Additional Details about the AB Stealer and Its Attack
Rather than having the AB Stealer's Command and Control servers on a specific location, criminals will use compromised websites and servers as the AB Stealer's Command and Control servers. After taking advantage of various vulnerabilities, such as weak RDP accounts, the cybercrooks can turn any computer into a Command and Control server virtually, allowing them to avoid detection and being tracked down by the people responsible for the AB Stealer attack. To prevent these attacks, PC security researchers advise computer users to avoid spam email messages, ensure that all software and website platforms are fully updated, and install a strong security program. According to reports from the AB Stealer's developers themselves, the following are the characteristics of the AB Stealer itself, as well as how it is detected by 35 different anti-virus programs on the market:
Filename: AbBuild v.1.0.exe
Filesize: 80,50 kB
Date: 2016-07-24 17 : 16 : 52
MD5: 9e44c10307aa8194753896ecf8102167
SHA1: 6e47601618ef2e2dfb1fed837ba7082cd7a427f4
Status: Infected
Rate: 20/35
Ad-Aware - Trojan.GenericKD.3404642
A-Squared - Trojan.GenericKD.3404642 (B)
Avast - File is clean
AVG Free - Trojan horse PSW.MSIL.BBDK
AntiVir (Avira) - TR/Keylog.exvk
BitDefender - Trojan.GenericKD.3404642
BullGuard - Gen:Variant.Razy.82094
Clam Antivirus - File is clean
COMODO Internet Security - File is clean
Dr.Web - File is clean
ESET NOD32 - Trojan.MSIL/Spy.Keylogger.AVQ
eTrust-Vet - Trojan.GenericKD.3404642
FortiClient - File is clean
F-PROT Antivirus - File is clean
F-Secure Internet Security - Trojan.GenericKD.3404642
G Data - Trojan.GenericKD.3404642
IKARUS Security - Trojan-PWS.MSIL
K7 Ultimate - Spyware ( 004bcf421 )
Kaspersky Antivirus - HEUR:Trojan.Win32.Generic
McAfee - File is clean
MS Security Essentials - TrojanSpy:Win32/Skeeyah.A!rfn
NANO Antivirus - File is clean
Norman - Trojan.GenericKD.3404642
Norton Antivirus - File is clean
Panda CommandLine - Trj/GdSda.A
Panda Security - Suspicious
Quick Heal Antivirus - EE:Malware.GenericKD.3404642
Solo Antivirus - File is clean
Sophos - Mal/Generic-S
SUPERAntiSpyware - File is clean
Trend Micro Internet Security - File is clean
Twister Antivirus - File is clean
VBA32 Antivirus - File is clean
VIPRE - Trojan.Win32.Generic=21BT
Zoner AntiVirus - File is clean
THIS IS FOR PERSONAL USE ONLY
Instructional video included with download
Please leave feedback
thenks
|