General
-
Target
PA$$w0rds_1234__FilerSetup2--P3.rar
-
Size
7.0MB
-
Sample
220616-n19pqaefdq
-
MD5
a10b8cbd560a760537680c211abec969
-
SHA1
87e5bf4c3ebc36a8311d4a224d3508c667d1e35f
-
SHA256
9cb6c1c7c3e62531baef80a60a81a21790d25a1fadeb136e156cf15348ceb55d
-
SHA512
52732cf8834e90f929f45cce197493ab4cf420cc9562d6ca02093b4ffc529276d3e8cdbdc6a093c8f37b2bf553a6caf0ddeeba6f522c0ed6e243bd4fcf99b82b
Static task
static1
Behavioral task
behavioral1
Sample
Setup1Crakeds.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Setup1Crakeds.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
Setup1Crakeds.exe
-
Size
727.2MB
-
MD5
199d352706be0428eb796c97e2706539
-
SHA1
d43878527ef974ae3921795a0ad31cc2d7862c0d
-
SHA256
2aebf18a5066221efc64205de32a15c073dd657f220406f433fd98e8c3a3cac6
-
SHA512
5e7cceff411bdc0e7bd330a953487b5982b96cd3317087a7bb086225a2e6b692ec08adc841bc0b4ff7ff52c58f9e0550f100f367edd8085c744bd4cd97c838ce
Score10/10-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-