Advertisement
shrutikas

Using a stealer, A Comprehensive Way.. In just 6 steps

May 24th, 2016
99
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.51 KB | None | 0 0
  1. 1) What is a stealer?
  2. It’s a program (generally coded in VB of Delphi), designed to steal, or in better words, designed to decrypt passwords stored by the users into their browsers (IE, FF, Chrome, etc…) or messenger/outlook/steam passwords
  3.  
  4.  
  5.  
  6.  
  7.  
  8.  
  9. 2) How to use stealer?
  10. Just download stealer.exe file from any reputed forum, and make sure that it has been posted by staff member or any senior and trusted member. When you download the stealer, it might get detected by some AV’s as virus, although it’s not. So, don’t panic. When you download, it’s generally compressed in .rar. Decompress it and then run.
  11.  
  12.  
  13.  
  14.  
  15.  
  16.  
  17. 3) How to setup???
  18. This is the main step. When you run, the main window you will see is about some ftp info or php info, depending upon the type of your stealer.
  19.  
  20.  
  21. FTP means, (File Transfer Protocol, 21). This is the easiest to setup.
  22. Just go to any file hosting site that provides FTP account, (Almost all sites provide FTP). (I prefer drivehq and t35) and create a free account. Then you will get your FTP info.
  23.  
  24.  
  25. If you have registered on drivehq.com, then you will have to put following info:
  26. ftp: http://ftp.drivehq.com
  27. username: your_username
  28. password: your_password
  29.  
  30.  
  31. If you have registered on spam.com, then you will have to put following info:
  32. ftp: your_username.spam.com
  33. username: your_username
  34. password: your_password
  35.  
  36.  
  37. And you are done. Put your info into stealer and make your exe file. Select desired option, according to your needs. This is for FTP based stealer.
  38.  
  39.  
  40.  
  41.  
  42. PHP means (hypertext preprocessor, 80). This is somewhat difficult to setup, again, depending upon the type of your stealer. If you are using iStealer 5.0.1, then setting up php is quite easy. If you are using Remote Penetration, then you will get into trouble if you are not familiar with this kind of thing.
  43.  
  44.  
  45. For this, you again have to make a free account on any free hosting site, which supports php hosting. I prefer blackapplehost.com
  46. When you create your account, you will get your database, and you will have to configure it through file manager.
  47. When you are done, configuring your database, you will have to modify your index.php (or any main php file, on which all logs will be sent). It’s quite easy to do this. Not much difficult.
  48.  
  49.  
  50. Then you just have to put your php URL into the stealer like this:-
  51. If you username is computer, then
  52. http://computer.blackapplehost.com/index.php
  53.  
  54.  
  55. When you put this URL into your browser, you will be redirected to your logs page, provided that you have setup correctly. There, you will get all your logs.
  56.  
  57.  
  58. Also, before starting to use your stealer, make sure to test your account to avoid disappointment. :P
  59. Almost all the stealer have the account testing facility.
  60.  
  61.  
  62. Use PHP stealer instead of FTP stealer. The main reason behind this is, your FTP login information is stored in your stealer.exe file. So, some intelligent users can open you EXE file via some debuggers and can steal your FTP information. So, its useless.
  63. In PHP stealer, your login info is stored in PHP file and that file is uploaded to server. Only your URL is stored in EXE.
  64.  
  65.  
  66. And I think it’s not possible to steal the login information of PHP stealer. Is there any way to steal this???
  67.  
  68.  
  69.  
  70.  
  71.  
  72.  
  73. 4) Stealer getting detected???
  74. When you make EXE out of your stealer, it WILL get detected by almost all AV’s if you are using public/free stealer. If you want your EXE to be FUD (Fully UnDetected), then buy a private edition. (I don’t prefer buying a private stealer, no point in buying private stealer.)
  75. Also, before making your EXE, you can combine exe with some program, just to fool your victims. This option is available in almost all stealers. Just have a look.
  76.  
  77.  
  78.  
  79.  
  80.  
  81.  
  82. 5) How to FUD your EXE???
  83. My suggestion: Do not buy a private stealer. Use any reputed and clean public (available to all) stealer and then crypt your EXE
  84. This is my suggestion. You can go by your own way.
  85. Now, I am assuming that you have setup FTP/PHP account correctly, tested it and worked correctly. Also, you have selected desired options and binded with some program.
  86. Now, you have two options. Either you can bind your program through a stealer or you can bind with your crypter. Many crypters provide binding option. I will explain some terms later.
  87. Now, you will have to buy a crypter. There are many reason to buy a crypter and many people sell their own private crypter. Just search the forum.
  88.  
  89.  
  90.  
  91.  
  92.  
  93.  
  94. 6) How to distribute your stealer???
  95. This step is the final step of my thread. Now I am assuming that you have made your stealer.exe, configured correctly, binded with some program and crypted successfully and TESTED (This is important).
  96. Now, there are many to spread your stealer. Your imagination is your friend. I will explain some ways.
  97. i) The best way: warez forums (There are literally 100’s of warez forums, search for them on Google.) Just register on some warez sites, (I prefer registering on at least 5-10 sites for fast results) then start distributing your stealer.
  98. ii) Torrents
  99. iii) P2P programs like LimeWire, BearShare, Kazaa, etc…
  100.  
  101.  
  102. When you spread through warez sites, your exe will remain FUD for a longer time and when you use torrent/p2p programs, it will get detected, literally within 6-7 days. This is my experience.
  103. So, use warez sites.
  104. ***NOTE***:- For more faster results, do this. When you start getting logs of warez sites, then do not use your own account to spread further. This is because, as you are a new user, people will scan your files under virustotal or nvt, etc… and your exe will get detected sooner. You will get other users’ in logs. Use those hacked warez accounts to start spreading further. Then you will receive more logs and at a much faster rate. (I think you got what I want to say) ;-)
  105.  
  106.  
  107.  
  108.  
  109.  
  110.  
  111. Why not to buy a stealer and to buy a crypter?
  112. The reason which I think is, when you buy a stealer, it will cost you at least $50 and above (depending success rate and options available). You will literally waste your money in a private stealer. It is FUD but not much in that.
  113. When you buy a crypter, you can crypter your files (almost any file). Crypting means, hiding from anti-viruses/firewalls. Also, in crypter, you get many options which make your work quite easy. You can hide stealer, virus, Trojan, keylogger by using a crypter and crypter will cost you hardly $50 or maximum $75, again depending upon the crypter configuration and options available.
  114. Also, you will have to buy a new stub periodically. Now, don’t ask me what is a stub. Ask the crypter seller. He can/will explain you very well.
  115. You can melt your exe, can save EOF, etc… Ask the seller about all this information.
  116.  
  117.  
  118.  
  119.  
  120. Important Terms:-
  121.  
  122.  
  123. i) Melt:- Your exe will get melt when your slave runs your file. So, no trace left behind.
  124. ii) Change Icon:- By default your EXE will get blue and white icon. You will HAVE to change the icon of your EXE for better results. (This is obvious).
  125. iii) Binder:- You can bind any program.exe with your stealer.exe file, as I stated earlier.
  126. iv) Anti’s :- What is this??.... errr….:- Better ask any programmer for better explanation.
  127. v) EOF:- End Of File. Must be enabled wherever applicable.
  128. vi) Delay execution:- This is not necessary actually, but will be useful on smart victims :P. This will delay the execution of your file by some seconds/minutes, depending upon you config.
  129. vii) AutoStart:- Some stealers get binded with a system process and send logs after every restart. Not much useful.
  130.  
  131.  
  132. There are many terms more. Ask stealer/crypter programmer for more information.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement