KPOT Stealer is a "stealer" malware that focuses on stealing account information and other data from various software applications and services
References
1. 2020-04-19 Didier Stevens posted analysis of KPOT infostealer on the Infosec Handlers Diary blog "KPOT Analysis: Obtaining the Decrypted KPOT EXE"
These are samples to follow his analysis routine.
2. 2019-05-09 Proofpoint. New KPOT v2.0 stealer brings zero persistence and in-memory features to silently steal credentials
Download
1. http://contagio.deependresearch.org/crime/kpotstealer_win_samp.zip from Didier Stevens' post
2. http://contagio.deependresearch.org/crime/kpotstealer(proofpoint)_win_samp.zip - Proofpoint
Hashes
1. From Didier Stevens' post
MD5 56ad7b243511ee7398d43df7643dc904
SHA-1 ae5ab7798ca267b1265a0496c562f219821d17cf
SHA-256 3fd4aa339bdfee23684ff495d884aa842165e61af85fd09411abfd64b9780146
2. From Proofpoint
MD5 7d7667ddce8fd69a0fd50bb08c287d10
SHA-1 087fc3e9a082983ee6a2b25f0ccb09eb723e0f39
SHA-256 67f8302a2fd28d15f62d6d20d748bfe350334e5353cbdef112bd1f8231b5599d
MD5 45ddc687f88b45fc3fec79f9dc8b38e2
SHA-1 de37b748e0e32d96c31f469f9ba4ea4f11e3e78b
SHA-256 36dcd40aee6a42b8733ec3390501502824f570a23640c2c78a788805164f77cecontagio.deependresearch.org/crime/kpotstealer(proofpoint)_win_samp.zip
MD5 56ad7b243511ee7398d43df7643dc904
SHA-1 ae5ab7798ca267b1265a0496c562f219821d17cf
SHA-256 3fd4aa339bdfee23684ff495d884aa842165e61af85fd09411abfd64b9780146
2. From Proofpoint
MD5 7d7667ddce8fd69a0fd50bb08c287d10
SHA-1 087fc3e9a082983ee6a2b25f0ccb09eb723e0f39
SHA-256 67f8302a2fd28d15f62d6d20d748bfe350334e5353cbdef112bd1f8231b5599d
MD5 45ddc687f88b45fc3fec79f9dc8b38e2
SHA-1 de37b748e0e32d96c31f469f9ba4ea4f11e3e78b
SHA-256 36dcd40aee6a42b8733ec3390501502824f570a23640c2c78a788805164f77cecontagio.deependresearch.org/crime/kpotstealer(proofpoint)_win_samp.zip
- Hacker Tools Hardware
- Hacking Apps
- Github Hacking Tools
- Hacking Tools Github
- Hacking Tools Download
- Pentest Tools Port Scanner
- Hacks And Tools
- How To Hack
- New Hack Tools
- What Is Hacking Tools
- Pentest Tools Free
- Hacking Tools For Kali Linux
- What Is Hacking Tools
- Hacking Tools Github
- Hacker Tools Apk Download
- Hacking Tools Free Download
- Hacking Tools Free Download
- Hacking Tools Software
- Hacking Tools For Kali Linux
- Hack Tools 2019
- Hacking Tools For Beginners
- Hacking Tools For Beginners
- Hacking Tools Name
- Hack Tools For Windows
- Hacking Tools For Beginners
- Hacker Tools 2019
- Hacker Tools For Mac
- Pentest Tools List
- Best Hacking Tools 2020
- Pentest Tools Download
- How To Hack
- Hacker Tools Github
- Hacking Tools Kit
- Pentest Tools Windows
- Hacker Tools Software
- Pentest Tools For Windows
- Hacking Apps
- Hacker Tools Hardware
- Pentest Tools Windows
- Pentest Tools Framework
- Hack Tools For Pc
- Hack Tools For Ubuntu
- Physical Pentest Tools
- Pentest Tools Android
- Hak5 Tools
- Hacker Tools For Pc
- Kik Hack Tools
- Nsa Hack Tools
- Pentest Tools For Mac
- Free Pentest Tools For Windows
- Pentest Tools Github
- Hack Rom Tools
- Pentest Tools Find Subdomains
- Bluetooth Hacking Tools Kali
- Best Hacking Tools 2019
- Pentest Tools Free
- Pentest Tools Website Vulnerability
- Hack Tools
- Pentest Tools Find Subdomains
- Easy Hack Tools
- Hack Tools
- Hacker Tools
- Hack Website Online Tool
- Hacker Tools List
- Pentest Tools Framework
- Hack Apps
- Hacking Tools
- Physical Pentest Tools
- Easy Hack Tools
- Hacking Tools For Windows
- Pentest Tools Nmap
- Pentest Tools Linux
- Pentest Tools Website Vulnerability
- Pentest Tools Apk
- Physical Pentest Tools
- Hackrf Tools
- Wifi Hacker Tools For Windows
- Pentest Tools Download
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Online
- Pentest Tools Linux
- Hacking Tools For Games
- Hacking Tools And Software
- Hacker Tools Windows
- Hack App
- Hacks And Tools
No comments:
Post a Comment