General
-
Target
b12a1fa92385401e41412dbee9f20586
-
Size
417KB
-
Sample
220612-fsjjkabga7
-
MD5
b12a1fa92385401e41412dbee9f20586
-
SHA1
6e0ef6df744bc30d5a8673232a6c21d9c3769bf2
-
SHA256
12f18490e690ffb027db41bc22d126b89b7ef04b8585e67559e60d176b5039fc
-
SHA512
df223ed0e3f3199428fc7a181a4965a211f23718a048d91e069d61563d7897b976ff7b05960eb01ca30ea31c14ea7a91c1e4e85039430637321925065dc74fd5
Static task
static1
Behavioral task
behavioral1
Sample
b12a1fa92385401e41412dbee9f20586.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
b12a1fa92385401e41412dbee9f20586.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
recordbreaker
http://167.235.245.75/
Targets
-
-
Target
b12a1fa92385401e41412dbee9f20586
-
Size
417KB
-
MD5
b12a1fa92385401e41412dbee9f20586
-
SHA1
6e0ef6df744bc30d5a8673232a6c21d9c3769bf2
-
SHA256
12f18490e690ffb027db41bc22d126b89b7ef04b8585e67559e60d176b5039fc
-
SHA512
df223ed0e3f3199428fc7a181a4965a211f23718a048d91e069d61563d7897b976ff7b05960eb01ca30ea31c14ea7a91c1e4e85039430637321925065dc74fd5
Score10/10-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Generic Stealer Sending System Information M1
suricata: ET MALWARE Generic Stealer Sending System Information M1
-
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-