Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/02/2025, 23:10
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe
Resource
win7-20240903-en
General
-
Target
2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe
-
Size
3.8MB
-
MD5
313ffe2d1d737e2f1deec4ade563f405
-
SHA1
fd4551f22f9592bf38bfaeeeb2bdc5b00afa82ff
-
SHA256
828f73827b587c784fad02d7bc4fdd7466845e028eba5c1fcb17d46a44a8acd7
-
SHA512
30a7da20ac18cae07d95e0e0742db40eb70bba85de13e5515f0dc496d1c507e0d875502fa0edd31f5bcccd2a085d70f9aba43ac102c236deee1bfbd81fd3a5d9
-
SSDEEP
98304:p3h6d68gwIteZNiiPwVpaOU/jIEeQfoR/IuOFVjUu5c:pR668aaELeFIF0wuS
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
remcos
ABILLION+NAIRA
nzobaku.ddns.net:8081
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-S0L1LJ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Xred family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2120 powershell.exe 2708 powershell.exe 2024 powershell.exe 2664 powershell.exe -
Executes dropped EXE 4 IoCs
pid Process 1776 ._cache_2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 2468 Synaptics.exe 836 Synaptics.exe 2912 ._cache_Synaptics.exe -
Loads dropped DLL 6 IoCs
pid Process 2596 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 2596 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 2596 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 836 Synaptics.exe 836 Synaptics.exe 836 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2324 set thread context of 2596 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 2468 set thread context of 836 2468 Synaptics.exe 46 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2776 schtasks.exe 2400 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 276 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 2708 powershell.exe 2120 powershell.exe 2468 Synaptics.exe 2468 Synaptics.exe 2468 Synaptics.exe 2468 Synaptics.exe 2024 powershell.exe 2664 powershell.exe 2468 Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe Token: SeDebugPrivilege 2708 powershell.exe Token: SeDebugPrivilege 2120 powershell.exe Token: SeDebugPrivilege 2468 Synaptics.exe Token: SeDebugPrivilege 2024 powershell.exe Token: SeDebugPrivilege 2664 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1776 ._cache_2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 276 EXCEL.EXE -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2120 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 31 PID 2324 wrote to memory of 2120 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 31 PID 2324 wrote to memory of 2120 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 31 PID 2324 wrote to memory of 2120 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 31 PID 2324 wrote to memory of 2708 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 33 PID 2324 wrote to memory of 2708 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 33 PID 2324 wrote to memory of 2708 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 33 PID 2324 wrote to memory of 2708 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 33 PID 2324 wrote to memory of 2776 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 35 PID 2324 wrote to memory of 2776 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 35 PID 2324 wrote to memory of 2776 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 35 PID 2324 wrote to memory of 2776 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 35 PID 2324 wrote to memory of 2596 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 2324 wrote to memory of 2596 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 2324 wrote to memory of 2596 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 2324 wrote to memory of 2596 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 2324 wrote to memory of 2596 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 2324 wrote to memory of 2596 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 2324 wrote to memory of 2596 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 2324 wrote to memory of 2596 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 2324 wrote to memory of 2596 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 2324 wrote to memory of 2596 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 2324 wrote to memory of 2596 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 2324 wrote to memory of 2596 2324 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 2596 wrote to memory of 1776 2596 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 38 PID 2596 wrote to memory of 1776 2596 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 38 PID 2596 wrote to memory of 1776 2596 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 38 PID 2596 wrote to memory of 1776 2596 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 38 PID 2596 wrote to memory of 2468 2596 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 39 PID 2596 wrote to memory of 2468 2596 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 39 PID 2596 wrote to memory of 2468 2596 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 39 PID 2596 wrote to memory of 2468 2596 2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe 39 PID 2468 wrote to memory of 2024 2468 Synaptics.exe 40 PID 2468 wrote to memory of 2024 2468 Synaptics.exe 40 PID 2468 wrote to memory of 2024 2468 Synaptics.exe 40 PID 2468 wrote to memory of 2024 2468 Synaptics.exe 40 PID 2468 wrote to memory of 2664 2468 Synaptics.exe 42 PID 2468 wrote to memory of 2664 2468 Synaptics.exe 42 PID 2468 wrote to memory of 2664 2468 Synaptics.exe 42 PID 2468 wrote to memory of 2664 2468 Synaptics.exe 42 PID 2468 wrote to memory of 2400 2468 Synaptics.exe 44 PID 2468 wrote to memory of 2400 2468 Synaptics.exe 44 PID 2468 wrote to memory of 2400 2468 Synaptics.exe 44 PID 2468 wrote to memory of 2400 2468 Synaptics.exe 44 PID 2468 wrote to memory of 836 2468 Synaptics.exe 46 PID 2468 wrote to memory of 836 2468 Synaptics.exe 46 PID 2468 wrote to memory of 836 2468 Synaptics.exe 46 PID 2468 wrote to memory of 836 2468 Synaptics.exe 46 PID 2468 wrote to memory of 836 2468 Synaptics.exe 46 PID 2468 wrote to memory of 836 2468 Synaptics.exe 46 PID 2468 wrote to memory of 836 2468 Synaptics.exe 46 PID 2468 wrote to memory of 836 2468 Synaptics.exe 46 PID 2468 wrote to memory of 836 2468 Synaptics.exe 46 PID 2468 wrote to memory of 836 2468 Synaptics.exe 46 PID 2468 wrote to memory of 836 2468 Synaptics.exe 46 PID 2468 wrote to memory of 836 2468 Synaptics.exe 46 PID 836 wrote to memory of 2912 836 Synaptics.exe 47 PID 836 wrote to memory of 2912 836 Synaptics.exe 47 PID 836 wrote to memory of 2912 836 Synaptics.exe 47 PID 836 wrote to memory of 2912 836 Synaptics.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BLznCuyzwk.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BLznCuyzwk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2250.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\._cache_2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1776
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BLznCuyzwk.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BLznCuyzwk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp74B3.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2400
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"5⤵
- Executes dropped EXE
PID:2912
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:276
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD5313ffe2d1d737e2f1deec4ade563f405
SHA1fd4551f22f9592bf38bfaeeeb2bdc5b00afa82ff
SHA256828f73827b587c784fad02d7bc4fdd7466845e028eba5c1fcb17d46a44a8acd7
SHA51230a7da20ac18cae07d95e0e0742db40eb70bba85de13e5515f0dc496d1c507e0d875502fa0edd31f5bcccd2a085d70f9aba43ac102c236deee1bfbd81fd3a5d9
-
Filesize
144B
MD5ae7821af4cb5c1aa57f68b6b97caeed1
SHA15bbe54f35ea81d5b4bab06be1d398af0b3bcf4a2
SHA256c206e7837b52385feca23bc2db7f3b8f6d6a362683d240caddd7bf60be2d1091
SHA512ca2c33174fc38febfd4c6755e7f5fec927b4897c237cdf8478568800ded2b073824b193005f5fa71b272b39f157fd097530bb04d190db6977ac3902f7411eb62
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
1KB
MD51fae72122be7ed51c261cf8648a188c0
SHA15f29b533b4e04bd9f32e8df410443aad85ba6d66
SHA25689f7ff3be8355ed44610649a04cf412a6c78d35d27d98b83f78d7c80e805fabe
SHA512b88ccc3787fff223cb3af43b25acd802a4f8c1c1fc996404a5e9565c8d25cfd3651a37f06b952d10acc6c26987d11e25de93e315b1d5df976d6a24dc2f3efb3e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\561WG3JFFJ14F5DD0UJA.temp
Filesize7KB
MD5f140f6ec06084eda6ccee6553551323f
SHA177aac99a8247573c153392f0bd2e69cd03d92008
SHA2566dd41d635639d6f6fd869b62049ee5a46adaaa555ec19023c775e937a6f37368
SHA512bbfb99ac7344d29de55845cea580626d77f343190f33178916812071acb158e305789b04287afa3ce9fb39b04e7ca20d72ecf2e3a44edee05d32d9634deacf0f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD51575eaf98d1c3d22ac8cf707134a01d9
SHA19023645ca0ffed6e4d45f12f6631d8dfb2fcc898
SHA25614376f003a42f7b9a5afb9a9da7e804e3a24a55e05e4c676b2b9f789063fac12
SHA5121ed67435d819966afdc27d9bce1edcf44092d632c12acab5b239ec18dcb22a39d8fb61ccd7ef4e7955e2cf3424594dddfc60037fa92cec2d82431a40ed79bef6
-
\Users\Admin\AppData\Local\Temp\._cache_2025-02-23_313ffe2d1d737e2f1deec4ade563f405_avoslocker_formbook_hijackloader_luca-stealer.exe
Filesize483KB
MD5f3b57ccad1c0a308635e17aa591e4038
SHA1ca67ad3c74523b844fc23563f7b288f0389fd645
SHA2565ad6b9a917f35be0a1d66c771069c2143ad765737eedd85436acbc0f95a4c0e7
SHA5125ed754a1b254e8a4b03e0445ac0081c94aaf179c2974827ce4ff10b7deb765d819243b2084212d7c91be9ddc07bf94f55e35f85564781b4124b61647a2f0977a