General

  • Target

    62049575053b432e93b176da7afcbe49387111b3a3d927b06c5b251ea82e5975

  • Size

    55KB

  • Sample

    220616-t2qwwsgaen

  • MD5

    7be1483472153324066babf71c683045

  • SHA1

    4436a1c572737a82494d4ddfe91929ce4cd836cd

  • SHA256

    62049575053b432e93b176da7afcbe49387111b3a3d927b06c5b251ea82e5975

  • SHA512

    5e0b75f6e3b493d44f29379df4a7b314a266afe7dc121d09eccd801f4a591210b8b0d5b19173c210c9bd89d5abccf82dafe44694cff3596b8f1e2a9398086fd1

Malware Config

Extracted

Family

recordbreaker

C2

http://142.132.180.233/

Targets

    • Target

      62049575053b432e93b176da7afcbe49387111b3a3d927b06c5b251ea82e5975

    • Size

      55KB

    • MD5

      7be1483472153324066babf71c683045

    • SHA1

      4436a1c572737a82494d4ddfe91929ce4cd836cd

    • SHA256

      62049575053b432e93b176da7afcbe49387111b3a3d927b06c5b251ea82e5975

    • SHA512

      5e0b75f6e3b493d44f29379df4a7b314a266afe7dc121d09eccd801f4a591210b8b0d5b19173c210c9bd89d5abccf82dafe44694cff3596b8f1e2a9398086fd1

    • RecordBreaker

      RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

    • suricata: ET MALWARE Generic Stealer Config Download Request

      suricata: ET MALWARE Generic Stealer Config Download Request

    • suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

      suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks