Analysis
-
max time kernel
39s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
16/06/2022, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
12e81b998b37955c4e028a9f46378b8b664646e3cc5f177a867321c54af30ca3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
12e81b998b37955c4e028a9f46378b8b664646e3cc5f177a867321c54af30ca3.exe
Resource
win10v2004-20220414-en
General
-
Target
12e81b998b37955c4e028a9f46378b8b664646e3cc5f177a867321c54af30ca3.exe
-
Size
7.0MB
-
MD5
ada1cf2fb2812726f5de2f8172da8ded
-
SHA1
4d04ec7384fb5c76ae17cff1280abedc4e8ebbbe
-
SHA256
12e81b998b37955c4e028a9f46378b8b664646e3cc5f177a867321c54af30ca3
-
SHA512
1806bcea0926addc3a73958c98309a3b455ad25667da42832819b4d3576321989dfc2a2ee8a52534a5e7c4a0e31204a7e34e2b3372c7dba12cfe9c293490730c
Malware Config
Signatures
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 316 12e81b998b37955c4e028a9f46378b8b664646e3cc5f177a867321c54af30ca3.exe