Logs, Stillers/Stealer Logs (terms and manuals for complete beginners)
Hello, I saw a lot of manuals on individual topics in this area, but why could no one put everything into one? I will not even look at other topics. Now you have already looked to Google for "What are logs?????" We'll start with the basics.
1. Stillers/Stealers
The above word (Stealer - thief, kidnapper, etc.) is a program that steals: passwords, logins, browser cookies, credit cards, however, all confidential information, and with the "FileGrabber" function it can steal files in certain directories specified by the fraudster (collectively, this is called - log). (The most famous: Redline, Raccoon, this is enough to familiarize yourself with, there are actually hundreds of variations). An example of what redline stealer is
2. RATS/Warriors
(Ratnik - Remote Access Trojan) - as the name implies - is a program that allows you to remotely control an infected PC, however, this program has a lot of functions, from a banal webcam view to loading additional viruses, such as miners. (the most famous: DCRAT, at least on this forum so exactly, despite the fact that it is quite cheap, while redline is an expensive pussy and does not justify its price)
An example of what DSRat looks like (once looked like) (Random screenshot from Google, in the photo you see infected PCs)
3. Logs
So we actually came to these very "Logs", what are logs? Yes, this is just a set of logins, passwords, hardware information, IP, files, and a screenshot when opening a file (not always, but there is also such a function, which is quite useful) It looks like this approximately other folders, it all depends on what the user has on the PC, for example, there may be a folder "wallets" in which there will be crypto wallets. "Soft" will contain software data you can import into your own files to access them accounts)
4. Checkers
"Well, what do I need these logs like them - to manually check everything? It's a long time!"Let's start with the fact that you're like a beginner - finishing logs for the first time days and can't do, if you're lucky and creative, then mabie.But if you are really too lazy to check anything (and in vain), then there are such programs as "checkers", (Checker - checker), as clearly by name it checks your logs for what is there, there are both paid checkers and ... (quacky paid checkers). For example, BlTools, a cool checker (without a proxy it is better not to use, because it kills some requests)
6.Crypt
File crypt - in simple words, encryption from antiviruses, Windows Defender, and other crap that will remove your malware as soon as it notices it. You will not be able to do such a thing yourself, so the easiest way is to ask for a review, or buy a crypt of your file for a couple of bucks, without a crypt you will not succeed, one person out of 30 will not have a single antivirus and Windows Defender is turned off.