General

  • Target

    Passwords 123 Setup Here.rar

  • Size

    5.3MB

  • Sample

    220616-qapmzafbbk

  • MD5

    324fa440120c4bf9a7c4fcc956f5bcac

  • SHA1

    fdc5b86648e001bd4c5b5fb14d2719e61ce7772e

  • SHA256

    4d8915f0725759ef33eb0650a94b716d4f37090e23664f66665d216aed5423bd

  • SHA512

    414f341eb1d694b6e590b5894ec3c8e6e4d037300b210192b4ca0b0e2e2d724376044486a2cd445d9208cdf4623120876424b83676c203311c3e0c5bdd14a64c

Malware Config

Extracted

Family

recordbreaker

C2

http://5.252.22.107/

http://77.91.102.115/

Targets

    • Target

      Setup.exe

    • Size

      465.0MB

    • MD5

      89a1be272c94305709327aac60b27803

    • SHA1

      c0e8c69784a196025c36bcdc640fabaf972ca989

    • SHA256

      b1ff6ff829f5f94cc4efa59b9ac622f1c9ddcf80c9b238c4b0102f0d487d1766

    • SHA512

      7168d00268160e845291dca9351fbc8c1cfc155931f911e3ab57cfd5e2d1c04aa022fc4623a9d67fd3b199f1492003019d2f1611a8919d1ad5e60bf76decb177

    • RecordBreaker

      RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

    • suricata: ET MALWARE Generic Stealer Config Download Request

      suricata: ET MALWARE Generic Stealer Config Download Request

    • suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

      suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks