RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging
The stealers are running in a while loop (the injector also in Hooking case) in the background, to kill them use Task Manager.
The stolen credentials are written to C:\Users\<Username>\Desktop\desktop.ini
ADS log
stream.
To get the credentials type the cmd command:
more < "C:\Users\<Username>\Desktop\desktop.ini:log"
To remove the stored credentials type the powershell command:
Remove-Item -Path "C:\Users\d1rk\Desktop\desktop.ini" -Stream "log"
N.B: Refer to the Demo down below for each use case