What are logs and how to work with them?

Professor

Professional
Messages
758
Reaction score
822
Points
93
This isn't a log processing tutorial, but a brief overview of what's in a log and what it actually is. Two simple examples will be Steam and Discord, but there are also banks, crypto, exchanges, and many other things. The channel also has many tutorials on working with bank logs, PayPal, Amazon, and many others. Don't be lazy and browse the our carding forum.

The archive with the log looks like this:​


9273feae-c59a-4d29-8366-626331daebb1.png


They may look like this, it depends on the stealer and its presettings.

0d88a92e-15d0-4974-b5f2-b6f28765ce8a.png


Let's quickly, concisely, and clearly understand what exactly is in the archive:

Frequent folders

The following folders will likely be present in the log if the user meets the conditions for their creation (if Steam or Discord aren't available, the corresponding folders won't be present either. But be careful! This doesn't work the other way around. That is, the absence of a folder doesn't always mean the service isn't present, but the absence of a service always means the absence of a folder).

Autofills

So what is AutoFills? A direct translation would say "automatic filling," which pretty accurately conveys the essence of the folder's contents.

Each of us has probably encountered the following window in our browser at least once:

c5bd7d3b1aa88e80229e4.png

Browser autofill suggestion

This is the exact data the folder stores. For example, in this case, Yandex remembered the value "Vilkin" for the "surname" field (most likely), and therefore immediately suggests it to me.

6310827e-5813-41c4-a4e5-f8af562d81a2.png


As you can see in the screenshot, the file name represents the browser that is the source of the autofill, which in our case is Chrome.

Inside, we will most likely encounter a text file of this format:

303a7d26-4b8b-487a-85e4-2ef1af3f2197.png


In each field, as the example has already been given, you can see the name of the field in which auto-replacement is performed, as well as the value being filled in under the names "Name" and "Value" respectively.

For greater clarity:
  • Name - the name of the autoreplacement field.
  • Value - the value to which the replacement is made.

If you hacked me, you would see the following picture (based on the example above):
  • Name - "surname"
  • Value - "Vilkin"

This folder is quite useful — it tells us a lot about the user, including values that may ultimately prove important and relevant when working with the log. For example, an address, postal code, phone number, name, or any other useful information. These values can also be used to determine the user's primary email address or primary account name — frequency of use will tell us everything.

Cookies

These are the ones that will make up a huge part of working with the log, and therefore it is important to analyze them in detail and understand what they mean.

To put it bluntly:
Cookies are files containing information collected during your visit to a website. This information is stored on your computer's hard drive and displays your preferences, most frequently visited topics, logins, and passwords.

To put it simply, a cookie can be considered a saved fragment of a user's session. So, even if we don't have the email password and login, we can still log in using that same fragment! The same can be done with any service that stores cookies.

It's logical that if a user logs out at the end of a session and a cookie was created in that format, we won't be able to log in the same way. Logging in using a cookie can also be considered a continuation of the previous user's session, so if that session ended when they logged out, there's nothing we can do about it.

Sometimes the folder may be missing. This happens if the victim's computer prevents third-party programs from extracting this information.

Just like in the AutoFills folder, the file names indicate the browser from which the cookie was retrieved. Furthermore, unlike in the previous folder, after the browser information, you'll see "Default Network" or "Profile X" (with any number in place of X). This indicates the browser profile. If it's a standard user/profile, it's "Default Network." Otherwise, as is common in families for convenience, it's "Profile."

8316f0e8-a6e7-46f2-a74d-388220529cca.png

2012e84c-26b7-4b71-a8ad-d565e774dfb0.png


The contents of the files don't really matter to us right now — there's little we can do with them at this stage. But that will change once we get down to work.

You can only look at the file creation date — if it's old enough, our cookies are quite possibly already dead. This means you won't be able to log in to your email or account using them.

Discord

This is where you'll find your Discord token — a unique account key consisting of a string of numbers and letters. You can use it to log in to your Discord account as follows:

Manually:
Open the main Discord page in your browser:

c9cb91dded856951f3419.png


Open the developer menu (F12) and go to the Console section:

35bf0558ed94674d2858b.png


Then we insert the following code:

Code:
function login(token) {
 setInterval(() => {
  document.body.appendChild(document.createElement`iframe`)
         .contentWindow.localStorage.token = `"${token}"`;
 }, 50);
 setTimeout(() => {
  location.reload();
 }, 2500);
}
login('your token')

Where in place of the words your token should be, accordingly, your token:

e414234ab71c40d531cd8.png


Press Enter, wait a bit... And instead of the "Login" button, we have something new! Press it and enjoy!

2e74c5e242d822d77e58d.png


More automated:
First, install the following plugin - https://chrome.google.com/webstore/detail/discord-token-login/ealjoeebhfijfimofmecjcjcigmadcai

e8d1cc31a8a9fd07f3ad0.png


Then we enter it and insert our token:

3c48cb4f7305d29ffb16c.png

197ce7be532d34d19f300.png


Click Login and you're done!

It's not the most important thing to work on, but it's interesting in terms of the information that can be obtained from the user's correspondence.

Steam

The only thing you can see in the Steam folder at first glance is a bunch of seemingly useless junk. In reality, this folder is a super-convenient thing.
Let's start with the first and most interesting thing. This is what will help us understand who this user is, even without accessing their email. What is this something, you ask? The "loginusers.vdf" file!

a55a3797-b409-447b-b0c7-c06786215e1f.png


Let's open it with a text editor and see a bunch of information that's not entirely clear to us... What interests us here are the following numbers in the file:

f2635d1c96c435336ade4.png


An observant user might also notice other interesting parameters related to the user's account and preferences, but for now, let's focus on the numbers. Paste our numbers into the following link: steamcommunity.com/profiles/numbers/ (replace "numbers" with our value).

Let's move on:

54e1e26f21d051ea6dfbb.png


Congratulations, we've reached our victim's profile! We can see their level, inventory count, achievements, games (if unlocked), and generally gather some background information before we begin our investigation.

9957b0228b435f0e3fd07.png


Since we're talking about using files from this folder, let's finish the job! Let's look at Steam Guard! Yes, you might not need this part of the article until later, but it's best to dot the i's and cross the t's now.

First, let's log out of Steam:

b7b50f90c6a6f80455022.png


And go to the following path: C:\Program Files (x86)\Steam\config

07f602ec-4d77-4887-a015-354fdbdb0ab0.png


We see a familiar "config.vdf" file, which we should replace with the equivalent from the log.
Replace:

634435514958d9fa2e545.png


Now we completely delete the contents of the following folders:
  • C:\Program Files (x86)\Steam\appcache
  • C:\Program Files (x86)\Steam\userdata

Return to C:\Program Files (x86)\Steam\ and look for your ssfn file there:

fd06b09f-9b90-4879-8d6d-90ddfc054224.png


And again, we replace our ssfn from the log with ours and delete the original:

3e97963b-fd81-470e-a5b7-4d5da01c2219.png

ed5cbf0a-789f-4f5c-830c-8aff0d74a604.png


Now we just log into Steam through Big Picture and we don’t have any Steam Guard (we still need to select a password).

1f43eb466dbaf2f8ecc30.png


Rare folders

These folders may not be present in the log, but they can be a nice addition!

FileGrabber

Again, let's turn to the direct translation! "File interceptor" quite accurately describes the contents of the folder. It contains folders and files from the victim's computer that the stealer (the malware itself, transmitting information) was able to capture.

4e99d52a-1784-4cf0-976d-07de550e8d9d.png


Don't be surprised by nested folders — everything is laid out the same way as on the user's PC. So, if folder X contained folder Y, that property will be preserved in the log.

The contents of the folder in my case:

dcca54db-1fb7-4de3-a1a4-542aac5b8772.png


Another interesting branching! The Desktop folder was clean, so let's move on to the most interesting part:

d24f134e-73d6-4662-a95f-634237dddc43.png


So, we've gone from porn games to information about games and user launchers! It couldn't be better. However, the Documents and Desktop folders are usually where the most important information is almost guaranteed to be.
I've used my own example to show how to work with this undoubtedly useful and sometimes amusing folder.

Wallets

Stores information about the user's desktop and e-wallets. Since it's not in my log, I'll use another example:

de19a8b3-9302-4c6c-a2c8-b999a8b48dea.png


Contents - folders of wallets with the same name and relevant information about them.

c4fa907c-3381-455f-8808-31e8b49e0dfd.png


There's nothing we can do about it at this stage, but if you do have this folder, you're quite possibly in luck, as the information you have can often be used to generate a conclusion or something similar. Any further steps are directly part of processing the log, which requires a separate article.

FTP

This folder stores files from file managers like FileZilla and TotalCommander, as well as information about the user's login servers. The presence of anything in this folder indicates that the victim has a server, dedicated server (a remote computer or server running 24/7), or website.

66d13b58-0754-4443-b8d1-c3e9a5538159.png


Example content:

27fa58f82f4f50c97a9e6.png


In our case, the victim may well be the owner of the website or live at the specified address. However, even this information can often be useful for investigation, revealing the victim's IP address or allowing access to other sites.

Credit Cards

Contains, logically, information about the user's credit cards:
  • Owner's full name
  • Card type
  • Card number
  • Best before date

But where is the most important parameter? Where is the CVC/CVV? Unfortunately, the browser usually doesn't save them with the associated card, so we can't extract them from this file.

Example content:

c25007b6-08ed-43c9-9f15-e5fdbf50bf38.png


A simple conclusion that can be confirmed later is that the cards, and therefore the majority of purchases, are most likely registered to profile 5, which is where you should look when processing.

An example of the file itself:

7758b2baf21a7abb9bfda.png


But the logical question is: "Why do I need all this information without the CVC/CVV code?"
  1. Many websites may require this information to recover something. Furthermore, the victim's name can also be found here.
  2. The CVC/CVV code can sometimes be found in the AutoFills folder. You can also try to find the necessary information from cloud storage, email, or other user data.

What to do if you find the coveted code is a topic for a separate article.
Overall, it's a convenient and useful folder.

Telegram

Let's keep it short and to the point here.

The folder contains the victim's Telegram session files. If we want to access it, simply move the files from the folder to our Telegram folder on the PC, replacing the previous ones. Alternatively, you can use Telegram X to save your personal previous session.

You may be denied access to a session if the original user has changed their credentials or disabled session login without a password. In this case, you can try to brute-force it using the Passwords folder, which will be discussed later.

From correspondence and dialogues, you can find out a lot about the user or obtain private information.
 
Top