Static task
static1
Behavioral task
behavioral1
Sample
3536-761-0x0000000010410000-0x0000000010422000-memory.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3536-761-0x0000000010410000-0x0000000010422000-memory.exe
Resource
win10v2004-20220414-en
General
-
Target
3536-761-0x0000000010410000-0x0000000010422000-memory.dmp
-
Size
72KB
-
MD5
829e58374247a7977826ee97ddbdae10
-
SHA1
7ae8dcc538603de34394471ace797c3bbd5d4cc4
-
SHA256
954cd3fa3923e3e4a4243edaff71066d71052ebeff303f6a1fb4dfa3565243e5
-
SHA512
b14dbf4842f25a201828feed42b7b70b5774714ebdd3a41cf9847ecedc18bc8aab8236be45a982432451fc7e58ad6cce3c794ee686b47d93c5a9bf63a5610ce8
-
SSDEEP
1536:kNuLGNwtTTMTOSY/R+q1tSPBvXO1oDybbVDvNoANyCa:kEGNw1TJSMR+Ho7VDFoANs
Malware Config
Extracted
recordbreaker
http://138.197.179.146/
Signatures
-
Recordbreaker family
Files
-
3536-761-0x0000000010410000-0x0000000010422000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ