General

  • Target

    1f7f83ed460a6780f3d6e82464a2d93b994e9df639d8a8ceb5a54a5eb8d6f834

  • Size

    7.4MB

  • Sample

    220616-t2pzlagadr

  • MD5

    8a0dbf93f55ae4345db165d5a2cb3329

  • SHA1

    cea9acdfd5efeb41d9bda588bed9423731738a01

  • SHA256

    1f7f83ed460a6780f3d6e82464a2d93b994e9df639d8a8ceb5a54a5eb8d6f834

  • SHA512

    6c4e0ce6fa84aac4154cf3ae98335324e61245ad66b52303054e0962221fd0b514ba472af526f7eee0f331dc36faab7b6013d666676dd4a9b8981cbe5aab8576

Malware Config

Targets

    • Target

      1f7f83ed460a6780f3d6e82464a2d93b994e9df639d8a8ceb5a54a5eb8d6f834

    • Size

      7.4MB

    • MD5

      8a0dbf93f55ae4345db165d5a2cb3329

    • SHA1

      cea9acdfd5efeb41d9bda588bed9423731738a01

    • SHA256

      1f7f83ed460a6780f3d6e82464a2d93b994e9df639d8a8ceb5a54a5eb8d6f834

    • SHA512

      6c4e0ce6fa84aac4154cf3ae98335324e61245ad66b52303054e0962221fd0b514ba472af526f7eee0f331dc36faab7b6013d666676dd4a9b8981cbe5aab8576

    • RecordBreaker

      RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

    • suricata: ET MALWARE Generic Stealer Config Download Request

      suricata: ET MALWARE Generic Stealer Config Download Request

    • suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

      suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks