General

  • Target

    084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0

  • Size

    4.5MB

  • Sample

    220621-dkk2bahhgl

  • MD5

    66ceefa68617c0dcde346c1a47ad39d9

  • SHA1

    ce567ad5355b684df7bb717d7908d210f2ea92c3

  • SHA256

    084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0

  • SHA512

    cc867bd8c776b5274e2a1e3e83714ec10ee6e4b7e97c9038e37f22a09138d5509c7c12d76a9eb67ded6ec6ee9f9d136b1147bc0350581a192d9d20e9acd7dda4

Malware Config

Extracted

Family

recordbreaker

C2

http://45.153.230.183/

http://5.252.23.110/

Targets

    • Target

      084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0

    • Size

      4.5MB

    • MD5

      66ceefa68617c0dcde346c1a47ad39d9

    • SHA1

      ce567ad5355b684df7bb717d7908d210f2ea92c3

    • SHA256

      084754ed1f495ee48a0bfe70b6b5c33ed17bfa129ad03356356ff3a5bf3c46f0

    • SHA512

      cc867bd8c776b5274e2a1e3e83714ec10ee6e4b7e97c9038e37f22a09138d5509c7c12d76a9eb67ded6ec6ee9f9d136b1147bc0350581a192d9d20e9acd7dda4

    • Raccoon ver2

      Raccoon ver2.

    • RecordBreaker

      RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

    • suricata: ET MALWARE Generic Stealer Config Download Request

      suricata: ET MALWARE Generic Stealer Config Download Request

    • suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

      suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks