Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28/02/2025, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe
Resource
win7-20241010-en
General
-
Target
2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe
-
Size
7.1MB
-
MD5
6f52824ad6e9272e8e856765ccf2039f
-
SHA1
d6dc08171366deda9887c16859d1b1641b499bf6
-
SHA256
68b9b268b7b16975e754826efd470e405b5e199e379a8da0a7fae188d5877253
-
SHA512
19a5ffbf4015ad4153490aae19bf2f687f5c375c74fbdf32a464cb8449522cf05162858dce92f52f2ac94ed816fce13af98bb778ba484e9f09699b46bbf0d564
-
SSDEEP
196608:lR668aaELKR668aaEL4R668aaELeFIF0wuW:lp8aa7p8aaZp8aapW
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Extracted
remcos
ABILLION+NAIRA
nzobaku.ddns.net:8081
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-S0L1LJ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Xred family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2328 powershell.exe 2956 powershell.exe 1820 powershell.exe 292 powershell.exe -
Executes dropped EXE 4 IoCs
pid Process 676 ._cache_2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 1664 Synaptics.exe 956 Synaptics.exe 1680 ._cache_Synaptics.exe -
Loads dropped DLL 6 IoCs
pid Process 2800 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 2800 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 2800 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 956 Synaptics.exe 956 Synaptics.exe 956 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1196 set thread context of 2800 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 1664 set thread context of 956 1664 Synaptics.exe 46 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2944 schtasks.exe 1788 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2072 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 2328 powershell.exe 2956 powershell.exe 1664 Synaptics.exe 1664 Synaptics.exe 1664 Synaptics.exe 1664 Synaptics.exe 1820 powershell.exe 292 powershell.exe 1664 Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe Token: SeDebugPrivilege 2328 powershell.exe Token: SeDebugPrivilege 2956 powershell.exe Token: SeDebugPrivilege 1664 Synaptics.exe Token: SeDebugPrivilege 1820 powershell.exe Token: SeDebugPrivilege 292 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 676 ._cache_2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 2072 EXCEL.EXE -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2328 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 31 PID 1196 wrote to memory of 2328 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 31 PID 1196 wrote to memory of 2328 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 31 PID 1196 wrote to memory of 2328 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 31 PID 1196 wrote to memory of 2956 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 33 PID 1196 wrote to memory of 2956 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 33 PID 1196 wrote to memory of 2956 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 33 PID 1196 wrote to memory of 2956 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 33 PID 1196 wrote to memory of 2944 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 35 PID 1196 wrote to memory of 2944 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 35 PID 1196 wrote to memory of 2944 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 35 PID 1196 wrote to memory of 2944 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 35 PID 1196 wrote to memory of 2800 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 1196 wrote to memory of 2800 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 1196 wrote to memory of 2800 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 1196 wrote to memory of 2800 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 1196 wrote to memory of 2800 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 1196 wrote to memory of 2800 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 1196 wrote to memory of 2800 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 1196 wrote to memory of 2800 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 1196 wrote to memory of 2800 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 1196 wrote to memory of 2800 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 1196 wrote to memory of 2800 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 1196 wrote to memory of 2800 1196 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 37 PID 2800 wrote to memory of 676 2800 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 38 PID 2800 wrote to memory of 676 2800 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 38 PID 2800 wrote to memory of 676 2800 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 38 PID 2800 wrote to memory of 676 2800 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 38 PID 2800 wrote to memory of 1664 2800 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 39 PID 2800 wrote to memory of 1664 2800 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 39 PID 2800 wrote to memory of 1664 2800 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 39 PID 2800 wrote to memory of 1664 2800 2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe 39 PID 1664 wrote to memory of 1820 1664 Synaptics.exe 40 PID 1664 wrote to memory of 1820 1664 Synaptics.exe 40 PID 1664 wrote to memory of 1820 1664 Synaptics.exe 40 PID 1664 wrote to memory of 1820 1664 Synaptics.exe 40 PID 1664 wrote to memory of 292 1664 Synaptics.exe 42 PID 1664 wrote to memory of 292 1664 Synaptics.exe 42 PID 1664 wrote to memory of 292 1664 Synaptics.exe 42 PID 1664 wrote to memory of 292 1664 Synaptics.exe 42 PID 1664 wrote to memory of 1788 1664 Synaptics.exe 43 PID 1664 wrote to memory of 1788 1664 Synaptics.exe 43 PID 1664 wrote to memory of 1788 1664 Synaptics.exe 43 PID 1664 wrote to memory of 1788 1664 Synaptics.exe 43 PID 1664 wrote to memory of 956 1664 Synaptics.exe 46 PID 1664 wrote to memory of 956 1664 Synaptics.exe 46 PID 1664 wrote to memory of 956 1664 Synaptics.exe 46 PID 1664 wrote to memory of 956 1664 Synaptics.exe 46 PID 1664 wrote to memory of 956 1664 Synaptics.exe 46 PID 1664 wrote to memory of 956 1664 Synaptics.exe 46 PID 1664 wrote to memory of 956 1664 Synaptics.exe 46 PID 1664 wrote to memory of 956 1664 Synaptics.exe 46 PID 1664 wrote to memory of 956 1664 Synaptics.exe 46 PID 1664 wrote to memory of 956 1664 Synaptics.exe 46 PID 1664 wrote to memory of 956 1664 Synaptics.exe 46 PID 1664 wrote to memory of 956 1664 Synaptics.exe 46 PID 956 wrote to memory of 1680 956 Synaptics.exe 47 PID 956 wrote to memory of 1680 956 Synaptics.exe 47 PID 956 wrote to memory of 1680 956 Synaptics.exe 47 PID 956 wrote to memory of 1680 956 Synaptics.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BLznCuyzwk.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BLznCuyzwk" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF844.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\._cache_2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\._cache_2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:676
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BLznCuyzwk.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:292
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BLznCuyzwk" /XML "C:\Users\Admin\AppData\Local\Temp\tmp51F7.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1788
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"5⤵
- Executes dropped EXE
PID:1680
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2072
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.1MB
MD56f52824ad6e9272e8e856765ccf2039f
SHA1d6dc08171366deda9887c16859d1b1641b499bf6
SHA25668b9b268b7b16975e754826efd470e405b5e199e379a8da0a7fae188d5877253
SHA51219a5ffbf4015ad4153490aae19bf2f687f5c375c74fbdf32a464cb8449522cf05162858dce92f52f2ac94ed816fce13af98bb778ba484e9f09699b46bbf0d564
-
Filesize
144B
MD53cc2b2a846ccb6a50c8d6f5293afc522
SHA151c1325ba01d3dcc5b2fcf38eb5fe38c70834eb0
SHA25632a4dac3a5c77e5d9fdb0e0f38edb2162dee93d6467c132f7d95728848bb3513
SHA5121973496b85f076b5118647dc03c8dbd7c756cdd78983a22b6421d1423319e45f57d68e7a6055a9e6a20755cad17677a8739365d9c2b9e92c20517b20fe8a4f2f
-
C:\Users\Admin\AppData\Local\Temp\._cache_2025-02-28_6f52824ad6e9272e8e856765ccf2039f_agent-tesla_avoslocker_formbook_hijackloader_luca-stealer.exe
Filesize483KB
MD5f3b57ccad1c0a308635e17aa591e4038
SHA1ca67ad3c74523b844fc23563f7b288f0389fd645
SHA2565ad6b9a917f35be0a1d66c771069c2143ad765737eedd85436acbc0f95a4c0e7
SHA5125ed754a1b254e8a4b03e0445ac0081c94aaf179c2974827ce4ff10b7deb765d819243b2084212d7c91be9ddc07bf94f55e35f85564781b4124b61647a2f0977a
-
Filesize
23KB
MD5dd151d735a41bb09127c31761bfa56e9
SHA198ce83e36c871e12611aab7ef468fcb4b3fc9cd6
SHA2567d76ca917c92cd4ed397cf2f778c02d09a5800c66f1745d8daa976a111f21424
SHA512c23bfb88f9d0cf307bceb1929e3b3bdd536458548ea7d6a682824c9e8390f85cfcc74a3e3157658d3a4d4c64a816e745ee022ffb966e6111dc3fed62732f6e32
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
1KB
MD543ab85be9a97bd68c7e6185660099339
SHA1548ddc2e63c89d977fbe856d63ad66eb856b704e
SHA256d9c4a786b947fd24d85f497fdf5cff329eaf0e3f73d6b6f08be281777db973fd
SHA512e1c2904c6631f6f0b0b0b59ab36d2a64e47dbf35484b23979f6810e1ff87281b6fc60170b032e1d90ea10a48c30e9d62196ef3d5123f50a9f7502f0f4a09f505
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD59982d53709d396a390d304d4da1ffdbe
SHA12a22a3df0ccd134ac64543e489cd2154e4f95829
SHA2564409041a89b8176f08287a7f650f420c4ad4f1175ec9b42c5a56d0ee912307a5
SHA512d7244c1a031b2f0e1da0aff409af498ada5dd4a787d209b48b464120c2bc309a4e5eaaaae4f5d3ecd9ec2b5880906a47be5354468ce8a32e8c43b8b67415a603
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5f764216377b8ef10f736e7e0ea20e114
SHA18d4f3d9f736bcfb1bd745edc69052071e426f3b5
SHA2562252adfbe6c74fb07448501048b3f2e649eea67e2b0df65577591f291ab900ca
SHA5121d3b12a77316729f20626a5a22b47aac74565cad5a7fa050071ce9721c26eab9fc89b42defdf69a6f8f4205f6ed9068efe1889f68a1d793d16e2eb0e72fd2a1b