ssl-keylog.txt using wireshark, is it malware?

Status
Not open for further replies.

Rov123

Level 1
Thread author
Nov 23, 2024
17
I hired some random dude online to help my PC with some troubleshooting. I noticed randomly he created this txt file using wireshark, it reads ssl-keylog.txt, and it's something like this:

"
# SSL/TLS secrets log file, generated by NSS
CLIENT_HANDSHAKE_TRAFFIC_SECRET 89f13b26248d5d0a64b69ab0a01b21187861283b91c83dcd85c640ab9c8c3b09 7e279d2b4f7fc944b1d4b6eed4366f74e46d8a55bc5a5a557ae4c88e9d2ea3ec
SERVER_HANDSHAKE_TRAFFIC_SECRET 89f13b26248d5d0a64b69ab0a01b21187861283b91c83dcd85c640ab9c8c3b09 e10cd5a934cd1ea8ca42f3698fdb87d443969277e4d2900e415e1b77b8cb7a64
CLIENT_HANDSHAKE_TRAFFIC_SECRET 5c7b94f6521a7e6711ae94b8b6bc5643ffa1f8853e29cb5093d18f73b80166f6 8962e5e66ff4bb3dc7d55852c623851ffe61af9b34fe42cb21b1efd05b6113c6
SERVER_HANDSHAKE_TRAFFIC_SECRET 5c7b94f6521a7e6711ae94b8b6bc5643ffa1f8853e29cb5093d18f73b80166f6 6a1898df1094f8877139cb74d7036982e3cf3deab3367a2d0ce06558ad9e5aa7
CLIENT_HANDSHAKE_TRAFFIC_SECRET 2fc0c80bfdbdf33cc5775f97fb0a2b5d3bdca261ac66168935bcd21ddbea1bc8 4800830aa686c5d00c1ca1c3c12240f3b224b1a6905883139a5f1134af023772
SERVER_HANDSHAKE_TRAFFIC_SECRET 2fc0c80bfdbdf33cc5775f97fb0a2b5d3bdca261ac66168935bcd21ddbea1bc8 19958a5884fb0bc9e5a7ea537e79192786e90d6e250896b542eac450ef9e14f8
CLIENT_RANDOM bf345212c11efc6c3687970c4cd14afc6b718898bd1f918465f6772602cc3060 2475ab96972dba190f1583f78cf46de90d8ef49458a445e4cedb3bad1cbde96bea447cb9a43efcedce48af23d3682492
CLIENT_HANDSHAKE_TRAFFIC_SECRET d00407a4cb56a4ef7fae8abce7b8ae574fbab13175c9061ddc23a9d97913c9b6 5bc5f07c289f63036ec118804e14f29a988dafa1de90df296ea63818a65ab641
SERVER_HANDSHAKE_TRAFFIC_SECRET d00407a4cb56a4ef7fae8abce7b8ae574fbab13175c9061ddc23a9d97913c9b6 4ea3024d7b9b7e8dd8a27e93043070e626668c0f37f7464a75123f5281d0689f
CLIENT_RANDOM f4fe1a4b1bef34ddc5421b5ff8c117d0b1b5189a277c645c3055f24cb9002e1b fa0d600e7d208987830328c6deb0fe6c80059d4cd4d3413e0374cb2406fb175d23836990ca281dfa9834f890b138c4e1
CLIENT_HANDSHAKE_TRAFFIC_SECRET 546954195a5a26cf0d73b5c3bd69cb44f50db1d644e14ba0eb14127bb5b93d15 b92a6cc327ae527f061e7ff396d87b810c965375967c7a91f86ae4c5e79beb55
SERVER_HANDSHAKE_TRAFFIC_SECRET 546954195a5a26cf0d73b5c3bd69cb44f50db1d644e14ba0eb14127bb5b93d15 4bf1f512a49eef1e27e15fe296ac0c314df0229090c056d50065542102db0c97
CLIENT_HANDSHAKE_TRAFFIC_SECRET bd89fb6d9c5db392cfec1990eb916b5b72939708a2dad6128edc90683378db92 8906d7b8a9766a923f3906f5eacaddfbaedc0b501ef8db112027fe47639457d0
SERVER_HANDSHAKE_TRAFFIC_SECRET bd89fb6d9c5db392cfec1990eb916b5b72939708a2dad6128edc90683378db92 bf8c336ab513c3c1a2b176945255f16e1af5e89042b4d6f5375d3a44eadd877b
CLIENT_HANDSHAKE_TRAFFIC_SECRET 2fd85377cf8a42073f4acc599aeff2d8646d880929ece1d959d80c432869b84a 31df0f86b3ea325dd45aa50aaa11d3f98c0c5396e3efc6f145a2c14ba76fa796
SERVER_HANDSHAKE_TRAFFIC_SECRET 2fd85377cf8a42073f4acc599aeff2d8646d880929ece1d959d80c432869b84a a2aaf53f6afb71a9cfadf422f7d40436f2f106efb6e1c7c3712540382992c985
...
...
"

I tried deleting the file and it does not allow me to, it says "The action can't be completed because the file is open in {application name} notification"
so I tried ending the process application, and it goes to the next application, for example, razer app, to microsoft edge, to bloons td6, I cannot delete it because for example reason it is being used by all applications on my PC.

I noticed he used wireshark during the creation of this txt file.
 

icotonev

Super Moderator
Verified
Staff Member
Mar 9, 2017
636
Hello and Happy New Year..! 🎄

First:

VirusTotal Online Virus Scanner
  • Please go to VirusTotal
  • Select Choose file
  • Navigate to the file ssl-keylog.txt and double click on it (repeat for each file, if more than one listed)
  • Select Confirm upload
  • Once completed, highlight the information in the address bar and copy and paste the link in your reply

Next ....:

Please follow the following instruction ..:

Download Farbar Recovery Scan Tool and save it to your desktop. --> IMPORTANT

If your antivirus software detects the tool as malicious, it’s safe to allow FRST to run. It is a false-positive detection.
If English is not your primary language, right click on FRST.exe/FRST64.exe and rename to FRSTEnglish.exe/FRST64English.exe

Note
: You need to run the version compatible with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.
  • Double-click the FRST icon to run the tool. When the tool opens click Yes to disclaimer.
  • Press Scan button and wait for a while.
  • The scanner will produced two logs on your Desktop: FRST.txt and Addition.txt.
  • Please attach the content of these two logs in your next reply.
---------------------------------------------------

In your next reply, please include:
  • FRST.txt
  • Addition.txt
 
  • Like
Reactions: Jonny Quest

icotonev

Super Moderator
Verified
Staff Member
Mar 9, 2017
636
Due to lack of activity, this topic is now closed. You requested help but did not respond to follow-up questions or instructions within three days and your topic has been moved here.
If you still need help, open a new topic, and wait for a new helper.
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top