Hardware Information Gathering

Hardware information gathering is a technique frequently employed by a variety of malware families, including Remote Access Trojans (RATs), Information Stealers or C2 frameworks. This technique typically forms part of the system reconnaissance phase during malware execution and provides attackers with detailed insight into the physical characteristics of an infected device.

Technique may extract data such as:

One of the primary uses of this information is to construct a Hardware Unique Identifier (HWID), a fingerprint based on hardware attributes that is far more resilient to tampering than identifiers like usernames or computer names, which can easily be changed. HWIDs are used by attackers for various purposes:

In more advanced use cases, Remote Access Trojans may include features to enumerate all installed physical devices, disable or remove drivers, or otherwise interfere with hardware components. These capabilities can be leveraged to sabotage the system and hinder recovery effort or reduce system stability as a form of disruption.

Featured Windows API

Associated Code Snippets

Id Name Language Author Published Date
4 Get Main Hard Drive Serial Delphi logoDelphi DarkCoderSc 3 days, 1 hour ago.