Overview
All configuration settings are defined inconfig/config.go. These values must be set before building the stealer binary.
C2 Configuration
Configure your command and control endpoints for data exfiltration.Discord webhook URL - PRIMARY exfiltration method.Format:
https://discord.com/api/webhooks/xxxxx/yyyyyThis is the preferred method for receiving stolen data as Discord webhooks are reliable and don’t require bot setup.Telegram bot token - BACKUP exfiltration method.Only used if Discord fails or isn’t set. Obtain from @BotFather on Telegram.
Telegram chat ID where data will be sent.Get this from @userinfobot on Telegram by sending
/start.Build Information
Identifiers for tracking and avoiding conflicts.Build identifier for tracking different campaigns.Change this for each campaign to track which victims came from which distribution method.
Mutex name to prevent multiple instances running simultaneously.
Change this value to avoid detection by mutex scanners and security products that fingerprint known stealer mutexes.
Module Toggles
Enable or disable specific stealing modules. More modules = more data but also more suspicious behavior.Data Collection Modules
Extract passwords, cookies, credit cards, and browsing history from all supported browsers.Targets Chromium-based browsers (Chrome, Edge, Brave, Opera, etc.) and Firefox-based browsers.
Steal cryptocurrency wallets - both desktop applications and browser extensions.See Targets for the complete list of supported wallets.
Extract Discord authentication tokens from desktop clients and browser sessions.Tokens can be used to access accounts without passwords.
Steal Telegram tdata session files.These files contain session data that can be used to hijack Telegram accounts.
Extract Steam ssfn and config files.These files can be used to bypass Steam Guard on other machines.
Capture a PNG screenshot of the victim’s desktop.Useful for understanding what the victim was doing and identifying additional attack vectors.
Collect system information including hostname, IP address, hardware specs, and OS details.Provides context about the victim machine for further exploitation.
Danger Zone
Add stealer to Windows registry and startup folder for persistence across reboots.
Delete the executable after successful execution.
Anti-Analysis Features
Recommended to keep both enabled for production builds to evade sandbox and researcher analysis.
Detect and exit if running in a virtual machine.Checks for VMware, VirtualBox, QEMU, Hyper-V, and other common virtualization platforms.
Detect and exit if a debugger is attached.Prevents dynamic analysis and reverse engineering attempts.
File Grabber Settings
The file grabber searches specific directories for interesting files based on extension filters.Enable the file grabber module.Searches configured directories for files matching specified extensions.
List of file extensions to grab from target directories.Default extensions:
Documents
Documents
.txt- Text files.doc- Word documents (legacy).docx- Word documents.xls- Excel spreadsheets (legacy).xlsx- Excel spreadsheets.pdf- PDF documents.json- JSON configuration files.csv- CSV data files
Databases
Databases
.db- Generic database files.sqlite- SQLite databases
Crypto & Keys
Crypto & Keys
.key- Private key files.pem- PEM certificates/keys.ppk- PuTTY private keys.kdbx- KeePass password databases
Configuration Files
Configuration Files
.rdp- Remote Desktop Protocol files.ovpn- OpenVPN configurations.conf- Generic config files
Wallet Files
Wallet Files
.wallet- Wallet data files.dat- Bitcoin wallet.dat and similar
Maximum file size in bytes (default: 5MB).Files larger than this will be skipped to avoid grabbing huge files that could slow down exfiltration.Formula:
5 * 1024 * 1024 = 5,242,880 bytesDirectories to search for files (relative to user home directory).Default paths:
Desktop- User desktop folderDocuments- User documents folderDownloads- User downloads folder
These directories typically contain the most valuable data. Additional paths can be added but will increase execution time.