: Designed to harvest confidential data such as browser passwords, system information, and data from installed software.
You should download, extract, or run this file. Analysis reports from ANY.RUN and Hybrid Analysis confirm that while it may be marketed as a "leecher" (a tool for finding proxy or account combos), its primary function is to compromise the host system.
The file is identified by multiple security platforms as highly malicious malware, specifically containing a Remote Access Trojan (RAT) and the RedLine Stealer . Malicious Findings Verdict : Malicious activity detected. Threat Types :
: Immediately drops and executes SLAYER Leecher v0.7.exe upon opening.
: Reads computer names, internet settings, and system certificate settings.
: Uses methods to check for supported languages and machine GUIDs to identify the environment. Security Recommendation
: Designed to harvest confidential data such as browser passwords, system information, and data from installed software.
You should download, extract, or run this file. Analysis reports from ANY.RUN and Hybrid Analysis confirm that while it may be marketed as a "leecher" (a tool for finding proxy or account combos), its primary function is to compromise the host system. SLAYER Leecher v0.7.rar
The file is identified by multiple security platforms as highly malicious malware, specifically containing a Remote Access Trojan (RAT) and the RedLine Stealer . Malicious Findings Verdict : Malicious activity detected. Threat Types : : Designed to harvest confidential data such as
: Immediately drops and executes SLAYER Leecher v0.7.exe upon opening. The file is identified by multiple security platforms
: Reads computer names, internet settings, and system certificate settings.
: Uses methods to check for supported languages and machine GUIDs to identify the environment. Security Recommendation