### Overview of the Attack Stages
The following describes the stages of a cyber attack that lead to code execution on the target machine and the download and execution of a credential-stealing malware. The operation included social engineering tactics, technologies, and exploits that navigated around security frameworks to successfully deliver malicious payloads.
---
### STAGE 1: Initial Contact - Fake CAPTCHA Social Engineering
- **Time:**


