Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe
Resource
win7-20240903-en
General
-
Target
2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe
-
Size
19.4MB
-
MD5
b735cbba7967f4a2272c7eae86f60cfc
-
SHA1
79dba983b8e28d976d8d263c5114e134d1d9d9e3
-
SHA256
a08da13ae86cffb5eea91b875e36eda9fc3f8ce853a1f5c9ef13f4737da35630
-
SHA512
c96a3f136ad4e777ab0132944fa741d06ce11a7c1ff1223be19a575fef0f169e090a98e4941049819001b3858b3fc0404dc3c094f5a5e28d4d69a425dcb2bab2
-
SSDEEP
393216:Op8aa1p8aaHp8aa+p8aaMp8aaGp8aaQp8aaqp8aa0p8aaSp8aa4:Kxa3xaJxaaxaAxaixa8xa+xaoxamxa4
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
remcos
ABILLION+NAIRA
nzobaku.ddns.net:8081
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-S0L1LJ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Xred family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2756 powershell.exe 2812 powershell.exe 800 powershell.exe 2348 powershell.exe -
Executes dropped EXE 4 IoCs
pid Process 1060 ._cache_2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 2368 Synaptics.exe 316 Synaptics.exe 1608 ._cache_Synaptics.exe -
Loads dropped DLL 6 IoCs
pid Process 2608 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 2608 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 2608 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 316 Synaptics.exe 316 Synaptics.exe 316 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1848 set thread context of 2608 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 37 PID 2368 set thread context of 316 2368 Synaptics.exe 46 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2860 schtasks.exe 2292 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1456 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 2812 powershell.exe 2756 powershell.exe 2368 Synaptics.exe 2368 Synaptics.exe 2368 Synaptics.exe 2368 Synaptics.exe 800 powershell.exe 2348 powershell.exe 2368 Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeDebugPrivilege 2756 powershell.exe Token: SeDebugPrivilege 2368 Synaptics.exe Token: SeDebugPrivilege 800 powershell.exe Token: SeDebugPrivilege 2348 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1060 ._cache_2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 1456 EXCEL.EXE -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2756 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 31 PID 1848 wrote to memory of 2756 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 31 PID 1848 wrote to memory of 2756 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 31 PID 1848 wrote to memory of 2756 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 31 PID 1848 wrote to memory of 2812 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 33 PID 1848 wrote to memory of 2812 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 33 PID 1848 wrote to memory of 2812 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 33 PID 1848 wrote to memory of 2812 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 33 PID 1848 wrote to memory of 2860 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 35 PID 1848 wrote to memory of 2860 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 35 PID 1848 wrote to memory of 2860 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 35 PID 1848 wrote to memory of 2860 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 35 PID 1848 wrote to memory of 2608 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 37 PID 1848 wrote to memory of 2608 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 37 PID 1848 wrote to memory of 2608 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 37 PID 1848 wrote to memory of 2608 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 37 PID 1848 wrote to memory of 2608 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 37 PID 1848 wrote to memory of 2608 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 37 PID 1848 wrote to memory of 2608 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 37 PID 1848 wrote to memory of 2608 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 37 PID 1848 wrote to memory of 2608 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 37 PID 1848 wrote to memory of 2608 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 37 PID 1848 wrote to memory of 2608 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 37 PID 1848 wrote to memory of 2608 1848 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 37 PID 2608 wrote to memory of 1060 2608 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 38 PID 2608 wrote to memory of 1060 2608 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 38 PID 2608 wrote to memory of 1060 2608 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 38 PID 2608 wrote to memory of 1060 2608 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 38 PID 2608 wrote to memory of 2368 2608 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 39 PID 2608 wrote to memory of 2368 2608 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 39 PID 2608 wrote to memory of 2368 2608 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 39 PID 2608 wrote to memory of 2368 2608 2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe 39 PID 2368 wrote to memory of 800 2368 Synaptics.exe 40 PID 2368 wrote to memory of 800 2368 Synaptics.exe 40 PID 2368 wrote to memory of 800 2368 Synaptics.exe 40 PID 2368 wrote to memory of 800 2368 Synaptics.exe 40 PID 2368 wrote to memory of 2348 2368 Synaptics.exe 42 PID 2368 wrote to memory of 2348 2368 Synaptics.exe 42 PID 2368 wrote to memory of 2348 2368 Synaptics.exe 42 PID 2368 wrote to memory of 2348 2368 Synaptics.exe 42 PID 2368 wrote to memory of 2292 2368 Synaptics.exe 43 PID 2368 wrote to memory of 2292 2368 Synaptics.exe 43 PID 2368 wrote to memory of 2292 2368 Synaptics.exe 43 PID 2368 wrote to memory of 2292 2368 Synaptics.exe 43 PID 2368 wrote to memory of 316 2368 Synaptics.exe 46 PID 2368 wrote to memory of 316 2368 Synaptics.exe 46 PID 2368 wrote to memory of 316 2368 Synaptics.exe 46 PID 2368 wrote to memory of 316 2368 Synaptics.exe 46 PID 2368 wrote to memory of 316 2368 Synaptics.exe 46 PID 2368 wrote to memory of 316 2368 Synaptics.exe 46 PID 2368 wrote to memory of 316 2368 Synaptics.exe 46 PID 2368 wrote to memory of 316 2368 Synaptics.exe 46 PID 2368 wrote to memory of 316 2368 Synaptics.exe 46 PID 2368 wrote to memory of 316 2368 Synaptics.exe 46 PID 2368 wrote to memory of 316 2368 Synaptics.exe 46 PID 2368 wrote to memory of 316 2368 Synaptics.exe 46 PID 316 wrote to memory of 1608 316 Synaptics.exe 47 PID 316 wrote to memory of 1608 316 Synaptics.exe 47 PID 316 wrote to memory of 1608 316 Synaptics.exe 47 PID 316 wrote to memory of 1608 316 Synaptics.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BLznCuyzwk.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BLznCuyzwk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp233A.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\._cache_2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1060
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:800
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BLznCuyzwk.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BLznCuyzwk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp77DE.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2292
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"5⤵
- Executes dropped EXE
PID:1608
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1456
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19.4MB
MD5b735cbba7967f4a2272c7eae86f60cfc
SHA179dba983b8e28d976d8d263c5114e134d1d9d9e3
SHA256a08da13ae86cffb5eea91b875e36eda9fc3f8ce853a1f5c9ef13f4737da35630
SHA512c96a3f136ad4e777ab0132944fa741d06ce11a7c1ff1223be19a575fef0f169e090a98e4941049819001b3858b3fc0404dc3c094f5a5e28d4d69a425dcb2bab2
-
Filesize
144B
MD56dc03f63e341c791ddb5fb64935dda77
SHA12d3ab3a2d6b820b379333b5bf9b8b84d073a9030
SHA25631693ae7cec1d010b2c0fb059ddcf69ae3932d6197766813a94ff824bfa3710c
SHA5127fe142b2d41860cdbc4686ff9b7aa71c6ceb7200dc4ce4f79cceac5b93808ec897a2405a8da290a59c6c08b0b29b50edf84f6c8225db49a9be34796bdc199b9a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
1KB
MD559a13a106552b1a13cee977f73aeb95f
SHA108fdc3c8d801a13dbe8a1f4fbf28037db4559717
SHA25642aea5c67590d543bdf178877ef2b205b915541b72708dba48f38608b5ab1fb7
SHA5120147c40d8cd7cab85aab7d1a015f4a07a69582bb46043caa8f022f5db31da64a88048e6ade764ed0c80f2f6334f8e0bdc9ba2bbfad3d06d07d93ed549037a32e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\38JQUROAB6WMY67BDR05.temp
Filesize7KB
MD5e5341ab55aba3a302ec4c56af119c9be
SHA127ff9333b6c4263ca9bf8d478d803f442244a09e
SHA2563fb3697fcecf24e2487524ad2d04e7c4a89147ac1a9b36e6bc0c1fcdfff4e289
SHA512badba11fee355a61abbde684b80f48e6c468bd7627f08ad42a5a089d9b6bf5a17722c5b85f2d471fe7b8301d45b87ca7917df59582f61b8a857ddf4fd5012464
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5c207aa9db43279fb319d26f030b4b98a
SHA1038ed84f0640b8f55543901360bfb905db1effaf
SHA256a33347022cc2e47789eb0ba7934cdc6266ccfd355486ff8adeb12a5dcd672911
SHA512766fe12fac42d90ce1da4e3e09d786bd603a3eeb885ce8c9bf75b92e9c32f4b8264db865e225dd1048e9aa6a9af6ab5c4b29f2ca90f43c1edf2db1370c09e5ff
-
\Users\Admin\AppData\Local\Temp\._cache_2024-12-16_b735cbba7967f4a2272c7eae86f60cfc_formbook_luca-stealer_magniber.exe
Filesize483KB
MD5f3b57ccad1c0a308635e17aa591e4038
SHA1ca67ad3c74523b844fc23563f7b288f0389fd645
SHA2565ad6b9a917f35be0a1d66c771069c2143ad765737eedd85436acbc0f95a4c0e7
SHA5125ed754a1b254e8a4b03e0445ac0081c94aaf179c2974827ce4ff10b7deb765d819243b2084212d7c91be9ddc07bf94f55e35f85564781b4124b61647a2f0977a