General
-
Target
0e9ea036cc3d12ebf13246ed845af7b0N.zip
-
Size
1.8MB
-
Sample
240712-26mc9sxbna
-
MD5
0e9ea036cc3d12ebf13246ed845af7b0
-
SHA1
1ca4f29e7730f4a58f5024b550e25777c185837e
-
SHA256
0011c648908367121eaa246fdd1dc0b4464aecbb48ecfe303e90625fcf6690d3
-
SHA512
e14354ce87e3b08e0daeb5efc9717e9e528484e304235c49805ac32a21c71611c489cbd4cffc4538de5a77bc3007874b35f62de142a50d465119b46b50101007
-
SSDEEP
49152:QpBkZr4lMy4rb8k8oRlw71f650JAK8J1creWGw:QHIr4u1MFoRlw71f65KtO1crebw
Static task
static1
Behavioral task
behavioral1
Sample
Receipt.exe
Resource
win7-20240708-en
Malware Config
Extracted
bitrat
1.38
racksbit.duckdns.org:4013
-
communication_password
827ccb0eea8a706c4c34a16891f84e7b
-
tor_process
tor
Targets
-
-
Target
Receipt.exe
-
Size
300.0MB
-
MD5
9b5cedfdbe69f0ae2d9fd76a8ca7c395
-
SHA1
bbf67b37e6a227a0719dafcfb8e28daeafedd189
-
SHA256
7d1110907532d120ac7cf5e077b7b68298708630f079997b2f2758efaaf4d22b
-
SHA512
9a02e1c81836bafe82e31d24259eba132929b99c5fb74025bc64820995eb6f3d25e548e6fd318b1be3b555b9e8b6a139a543037d07f6914749fe496c1dfac3d6
-
SSDEEP
49152:hBkHVm1sE2BbkkwaFXw7Nt25SVEK6/1S2Uwc:/YVmC7GRaFXw7Nt25ep01S2Uwc
-
Executes dropped EXE
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-