General
-
Target
Passwords 123 Setup Here.rar
-
Size
5.3MB
-
Sample
220616-qapmzafbbk
-
MD5
324fa440120c4bf9a7c4fcc956f5bcac
-
SHA1
fdc5b86648e001bd4c5b5fb14d2719e61ce7772e
-
SHA256
4d8915f0725759ef33eb0650a94b716d4f37090e23664f66665d216aed5423bd
-
SHA512
414f341eb1d694b6e590b5894ec3c8e6e4d037300b210192b4ca0b0e2e2d724376044486a2cd445d9208cdf4623120876424b83676c203311c3e0c5bdd14a64c
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
recordbreaker
http://5.252.22.107/
http://77.91.102.115/
Targets
-
-
Target
Setup.exe
-
Size
465.0MB
-
MD5
89a1be272c94305709327aac60b27803
-
SHA1
c0e8c69784a196025c36bcdc640fabaf972ca989
-
SHA256
b1ff6ff829f5f94cc4efa59b9ac622f1c9ddcf80c9b238c4b0102f0d487d1766
-
SHA512
7168d00268160e845291dca9351fbc8c1cfc155931f911e3ab57cfd5e2d1c04aa022fc4623a9d67fd3b199f1492003019d2f1611a8919d1ad5e60bf76decb177
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-