Conversation

I believe ad.roster.items in user.conf for Anydesk are recent sessions made. That's a lot of sessions - is this a logged in account that lets us see what the scammers are doing?
Image
1
132
They do seem to have stored a couple of passwords in Edge's password safe. Not sure how to trivially access that from an image, might need to boot from an image.
2
124
cheesedog123 gives this hash. Salt changes each time. ad.anynet.pwd_hash=c81e58dc07bfb2dc42e5bffd47f25d7d17d870e673895bee99b36d6c28bd3960 ad.anynet.pwd_salt=2170a3c5bfd1728bb098f4fdcabfd6ea
2
125
Thanks to and a memory dump into this function from Frida and we have the hash function worked out. It's sha256(password + null + salt) I thought I tried that but must have made a mistake.
Image
4
138
Ok - parallel to this, I've pulled the passwords from Edge. They are the same and of the form Word123. They used the user's email address on several money transfer platforms. The pass works.
1
152