HackTool.MSIL.PasswordDump.YABHF
Windows
![](/vinfo/imgFiles/legend.jpg)
Threat Type: Hacking Tool
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It gathers certain information on the affected computer.
TECHNICAL DETAILS
Arrival Details
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This Hacking Tool adds the following folders:
- {2nd argument}\ → contains folders of gathered data
- {2nd argument}\__{Computer name}_{Drive Letter}$_users_{username}\ → contains gathered information
Information Theft
This Hacking Tool gathers the following information on the affected computer:
- local Chrome Login Database
Other Details
This Hacking Tool does the following:
- It checks all the available users from the list of targeted machines in {1st argument} for the SQL database file: "{user name}\AppData\Local\Google\Chrome\user data\Default\Login Data"
- If present, copies file to {2nd argument} and renamed as the following:
- __{Computer name}_{Drive Letter}$_users_{username}\logdata
- If present, copies file to {2nd argument} and renamed as the following:
It accepts the following parameters:
- {1st argument} → file containing list of Computer Name and/or IP Addresses seperated by a new line
- {2nd argument} → path to store gathered information
- {3rd argument} → number of threads to create/run simultaneously
SOLUTION
Step 1
Before doing any scans, Windows 7, Windows 8, Windows 8.1, and Windows 10 users must disable System Restore to allow full scanning of their computers.
Step 2
Note that not all files, folders, and registry keys and entries are installed on your computer during this malware's/spyware's/grayware's execution. This may be due to incomplete installation or other operating system conditions. If you do not find the same files/folders/registry information, please proceed to the next step.
Step 3
Search and delete these files
- __{Computer name}_{Drive Letter}$_users_{username}\logdata
Step 4
Search and delete this folder
- {2nd argument}\
Step 5
Scan your computer with your Trend Micro product to delete files detected as HackTool.MSIL.PasswordDump.YABHF. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:
Did this description help? Tell us how we did.