HWID (Hardware Identification) is a unique digital identifier generated based on a computer's hardware configuration (motherboard, CPU, HDD, etc.). Infostealers collect HWID to fingerprint infected devices, allowing attackers to distinguish between different victims, organize stolen logs, and avoid duplicate entries in their Command and Control (C2) panels.
In the ecosystem of cybercrime, identifying a specific target is essential for logistics. HWID (Hardware Identification)serves as a unique serial number for your entire computer. When an Infostealer infects a machine, one of its primary tasks is to generate this ID and send it back to the attacker’s dashboard as a reference for all stolen data from that specific user.
For a threat actor managing thousands of "bots" or "logs," the HWID provides necessary organization:
An HWID is typically a hash (like MD5 or SHA) created by combining several hardware components, such as:
During an incident response phase, HWID is a crucial forensic data point. If Dark Radar identifies a leaked log from your organization on an underground forum, the HWID included in that log can be matched against your internal inventory to pinpoint exactly which workstation was compromised, even if the user has changed their IP address.
In summary; HWID is the ultimate identifier for your physical machine. For an infostealer, it is the primary method of cataloging its "merchandise" and ensuring that every stolen password is tied to a specific, traceable source.
A Honeytoken is a piece of fictitious data, such as a fake password, API key, or document, placed within a system to detect unauthorized access. Because these tokens have no legitimate use, any interaction with them serves as a high-fidelity alert for an active Infostealer infection or a data breach.
Hooking is a technique used by software, often malicious like an Infostealer, to intercept function calls, messages, or events within an operating system or an application. By "hooking" into a browser's process, malware can capture sensitive data such as passwords in plain text before they are processed or encrypted.