General
-
Target
INVOICE.exe
-
Size
1.6MB
-
Sample
220623-ce5m4aeah7
-
MD5
dcc3fab0819a6859a896f163c78d8d8f
-
SHA1
356682a4ed7d49531f61caf30b3ce705909ef35d
-
SHA256
5b35b7ece66692f0291cfd6d27bb430a4c0680e6a9706fbca578b90799786458
-
SHA512
1039d8f79fdb9563814b72ca7866e3aab3e37999405f5ce5502ce47fad38c09930e51e4f2c8a85b27533e84fc254e8cead5462ae5d2640b9dbee4f4c93b60091
Static task
static1
Behavioral task
behavioral1
Sample
INVOICE.exe
Resource
win7-20220414-en
Malware Config
Extracted
bitrat
1.38
bitrat9400.duckdns.org:9400
-
communication_password
e10adc3949ba59abbe56e057f20f883e
-
tor_process
tor
Targets
-
-
Target
INVOICE.exe
-
Size
1.6MB
-
MD5
dcc3fab0819a6859a896f163c78d8d8f
-
SHA1
356682a4ed7d49531f61caf30b3ce705909ef35d
-
SHA256
5b35b7ece66692f0291cfd6d27bb430a4c0680e6a9706fbca578b90799786458
-
SHA512
1039d8f79fdb9563814b72ca7866e3aab3e37999405f5ce5502ce47fad38c09930e51e4f2c8a85b27533e84fc254e8cead5462ae5d2640b9dbee4f4c93b60091
-
Executes dropped EXE
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-