Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 19:22
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe
Resource
win7-20240903-en
General
-
Target
2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe
-
Size
20.9MB
-
MD5
6cb693db239cbe4ace20488191cd0f6a
-
SHA1
5fc1473386f9bf520ace7600c6b1b8aba976b6bf
-
SHA256
e7829ce1e9faac6902ced6066882fb01e881c8e92c64d02251f9adaa0ad43262
-
SHA512
bd01bf4755203ab0b4726fc4386536bb6d9c16f1cfd80ccb0e529682a2faf202d885f4980cecb85f43d8cce7c6c468514291765867af5b6218701d518a0005fc
-
SSDEEP
393216:7p8aaGp8aakp8aamp8aa/p8aa5p8aaDp8aa9p8aaXp8aahp8aa:Vxaixa4xaCxahxazxadxa/xa5xabxa
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
remcos
ABILLION+NAIRA
nzobaku.ddns.net:8081
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-S0L1LJ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Xred family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2852 powershell.exe 2636 powershell.exe 2400 powershell.exe 1716 powershell.exe -
Executes dropped EXE 7 IoCs
pid Process 2824 ._cache_2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 1700 Synaptics.exe 1832 Synaptics.exe 3048 Synaptics.exe 1544 Synaptics.exe 1976 Synaptics.exe 1068 Synaptics.exe -
Loads dropped DLL 3 IoCs
pid Process 484 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 484 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 484 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2672 set thread context of 484 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2520 schtasks.exe 2240 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 2852 powershell.exe 2636 powershell.exe 1700 Synaptics.exe 1700 Synaptics.exe 1700 Synaptics.exe 1700 Synaptics.exe 2400 powershell.exe 1716 powershell.exe 1700 Synaptics.exe 1700 Synaptics.exe 1700 Synaptics.exe 1700 Synaptics.exe 1700 Synaptics.exe 1700 Synaptics.exe 1700 Synaptics.exe 1700 Synaptics.exe 1700 Synaptics.exe 1700 Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe Token: SeDebugPrivilege 2852 powershell.exe Token: SeDebugPrivilege 2636 powershell.exe Token: SeDebugPrivilege 1700 Synaptics.exe Token: SeDebugPrivilege 2400 powershell.exe Token: SeDebugPrivilege 1716 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2824 ._cache_2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2852 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 30 PID 2672 wrote to memory of 2852 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 30 PID 2672 wrote to memory of 2852 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 30 PID 2672 wrote to memory of 2852 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 30 PID 2672 wrote to memory of 2636 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 32 PID 2672 wrote to memory of 2636 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 32 PID 2672 wrote to memory of 2636 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 32 PID 2672 wrote to memory of 2636 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 32 PID 2672 wrote to memory of 2520 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 34 PID 2672 wrote to memory of 2520 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 34 PID 2672 wrote to memory of 2520 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 34 PID 2672 wrote to memory of 2520 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 34 PID 2672 wrote to memory of 484 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 36 PID 2672 wrote to memory of 484 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 36 PID 2672 wrote to memory of 484 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 36 PID 2672 wrote to memory of 484 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 36 PID 2672 wrote to memory of 484 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 36 PID 2672 wrote to memory of 484 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 36 PID 2672 wrote to memory of 484 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 36 PID 2672 wrote to memory of 484 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 36 PID 2672 wrote to memory of 484 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 36 PID 2672 wrote to memory of 484 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 36 PID 2672 wrote to memory of 484 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 36 PID 2672 wrote to memory of 484 2672 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 36 PID 484 wrote to memory of 2824 484 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 37 PID 484 wrote to memory of 2824 484 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 37 PID 484 wrote to memory of 2824 484 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 37 PID 484 wrote to memory of 2824 484 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 37 PID 484 wrote to memory of 1700 484 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 38 PID 484 wrote to memory of 1700 484 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 38 PID 484 wrote to memory of 1700 484 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 38 PID 484 wrote to memory of 1700 484 2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe 38 PID 1700 wrote to memory of 2400 1700 Synaptics.exe 40 PID 1700 wrote to memory of 2400 1700 Synaptics.exe 40 PID 1700 wrote to memory of 2400 1700 Synaptics.exe 40 PID 1700 wrote to memory of 2400 1700 Synaptics.exe 40 PID 1700 wrote to memory of 1716 1700 Synaptics.exe 42 PID 1700 wrote to memory of 1716 1700 Synaptics.exe 42 PID 1700 wrote to memory of 1716 1700 Synaptics.exe 42 PID 1700 wrote to memory of 1716 1700 Synaptics.exe 42 PID 1700 wrote to memory of 2240 1700 Synaptics.exe 43 PID 1700 wrote to memory of 2240 1700 Synaptics.exe 43 PID 1700 wrote to memory of 2240 1700 Synaptics.exe 43 PID 1700 wrote to memory of 2240 1700 Synaptics.exe 43 PID 1700 wrote to memory of 3048 1700 Synaptics.exe 46 PID 1700 wrote to memory of 3048 1700 Synaptics.exe 46 PID 1700 wrote to memory of 3048 1700 Synaptics.exe 46 PID 1700 wrote to memory of 3048 1700 Synaptics.exe 46 PID 1700 wrote to memory of 1832 1700 Synaptics.exe 47 PID 1700 wrote to memory of 1832 1700 Synaptics.exe 47 PID 1700 wrote to memory of 1832 1700 Synaptics.exe 47 PID 1700 wrote to memory of 1832 1700 Synaptics.exe 47 PID 1700 wrote to memory of 1544 1700 Synaptics.exe 48 PID 1700 wrote to memory of 1544 1700 Synaptics.exe 48 PID 1700 wrote to memory of 1544 1700 Synaptics.exe 48 PID 1700 wrote to memory of 1544 1700 Synaptics.exe 48 PID 1700 wrote to memory of 1976 1700 Synaptics.exe 49 PID 1700 wrote to memory of 1976 1700 Synaptics.exe 49 PID 1700 wrote to memory of 1976 1700 Synaptics.exe 49 PID 1700 wrote to memory of 1976 1700 Synaptics.exe 49 PID 1700 wrote to memory of 1068 1700 Synaptics.exe 50 PID 1700 wrote to memory of 1068 1700 Synaptics.exe 50 PID 1700 wrote to memory of 1068 1700 Synaptics.exe 50 PID 1700 wrote to memory of 1068 1700 Synaptics.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BLznCuyzwk.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BLznCuyzwk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9F4B.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Users\Admin\AppData\Local\Temp\._cache_2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BLznCuyzwk.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BLznCuyzwk" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF6FC.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2240
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:3048
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:1832
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:1544
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:1976
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:1068
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20.9MB
MD56cb693db239cbe4ace20488191cd0f6a
SHA15fc1473386f9bf520ace7600c6b1b8aba976b6bf
SHA256e7829ce1e9faac6902ced6066882fb01e881c8e92c64d02251f9adaa0ad43262
SHA512bd01bf4755203ab0b4726fc4386536bb6d9c16f1cfd80ccb0e529682a2faf202d885f4980cecb85f43d8cce7c6c468514291765867af5b6218701d518a0005fc
-
Filesize
144B
MD5f543c061617e9700982b7facbbe7c143
SHA110e3392259a8fff6d48586641c204f84cb2e5563
SHA25621cf122cbeff2731576b01fea0a2c56c21f74de3cd1673dde0a93b5615edf12c
SHA512eba61fde23d384d22783ebe7a613381816054bdc97bf587caea21659822ec430fd8a857470fd9b830eb1c4ec5b1a867fc557f684d90c2762d9e50a72df82a15b
-
Filesize
1KB
MD57daa0e3c6f21a9f3adbbe29b2692c23f
SHA152b57abdd1d42e34ebf28fa2f2320e4789770e16
SHA25606d73eb702e143cda4be2bd2a2d84482d3982dcf9f143fb6373cca16b8ab35d2
SHA5125d81a3a9bfbfe5a2761b2bfe334e3b5545cd347654e00f8ec8b9a3e5d1f2b127daaa71bf02785274165f3653c7f9a03dc1f2616b02290195fd1642b16f7ee475
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QT4E5H3LKI5OS7BOJIWL.temp
Filesize7KB
MD5a004d73e4ce3e2a7001a74b355274bde
SHA13aea21d2ff356cb90b7dae17ef882bdef8a351e0
SHA25684a86624067d9bdbec99aade789072d3a0ed93769ba2a130e676f66a30b13852
SHA512b8567a7395ed83ae16f019786c1489733ae7b139c586fa5008dfa76ab3a80dce67fd0009e470bc8dc835db700e86c12da2c4496fac9696c0754932b4d2a038b1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5dbd6bbfa274870d5ad812c34d1b954e3
SHA14339c56f6db346d02600e135759cf94317279ee0
SHA256f068037e9286a1b40a85565610cf2835f3e6df9b7c3a04be1f4def05a25c6b54
SHA512977a60c2fcb0f996d2cc5d3265f6d90905684e1dcc385f5ca3225ff3f085901d2d5788b6e5cac4067b77d4f63436a017c8e020724fb692f6c3746bd5e5f74b23
-
\Users\Admin\AppData\Local\Temp\._cache_2025-01-06_6cb693db239cbe4ace20488191cd0f6a_formbook_luca-stealer_magniber.exe
Filesize483KB
MD5f3b57ccad1c0a308635e17aa591e4038
SHA1ca67ad3c74523b844fc23563f7b288f0389fd645
SHA2565ad6b9a917f35be0a1d66c771069c2143ad765737eedd85436acbc0f95a4c0e7
SHA5125ed754a1b254e8a4b03e0445ac0081c94aaf179c2974827ce4ff10b7deb765d819243b2084212d7c91be9ddc07bf94f55e35f85564781b4124b61647a2f0977a