[ RDP Stealer ]
==========================
DESCRIPTION :
I know most people work on RDP , When you connect to a computer
(either a Windows client or Windows Server) through the Remote Desktop client
the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default)
Port 3389 is being checked in RDP The malware is then run on the RDP
The password is changed without the need for the old password
How To Use
Extract The Zip File / Change token and ID / send to target
The software collects a digital fingerprint of the computer :
- Version of the operating system and its bitness
- IP and RAM
- Computer name
- Local time
- I am not responsible for how you use the software
PASWORD OF FILE - tr
==========================
DESCRIPTION :
I know most people work on RDP , When you connect to a computer
(either a Windows client or Windows Server) through the Remote Desktop client
the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default)
Port 3389 is being checked in RDP The malware is then run on the RDP
The password is changed without the need for the old password
How To Use
Extract The Zip File / Change token and ID / send to target
The software collects a digital fingerprint of the computer :
- Version of the operating system and its bitness
- IP and RAM
- Computer name
- Local time
- I am not responsible for how you use the software
PASWORD OF FILE - tr