Analysis
-
max time kernel
52s -
max time network
186s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
21-06-2022 03:18
Static task
static1
Behavioral task
behavioral1
Sample
a25fd13894644550fa9ca60a046813031e5189d4abe4bbd68ed9e6dcfc85d698.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a25fd13894644550fa9ca60a046813031e5189d4abe4bbd68ed9e6dcfc85d698.exe
Resource
win10-20220414-en
General
-
Target
a25fd13894644550fa9ca60a046813031e5189d4abe4bbd68ed9e6dcfc85d698.exe
-
Size
7.1MB
-
MD5
3f6a84da68d75bc0534974f46f2d5acc
-
SHA1
71b99507ca40382d0073f6ee7b8f515b11a2ae64
-
SHA256
a25fd13894644550fa9ca60a046813031e5189d4abe4bbd68ed9e6dcfc85d698
-
SHA512
291fa44df9aea643ffd483f8b4d35cb5b985d0ff29a1dabf86ce8b87144ad792183433e4e4d0a7b2f9c15ef91b17f995687f447bd9c4e8e63594d38cfff35dd4
Malware Config
Signatures
-
Raccoon ver2 3 IoCs
Raccoon ver2.
resource yara_rule behavioral2/memory/1120-139-0x00000000013C0000-0x0000000001EE6000-memory.dmp raccoon_v2 behavioral2/memory/1120-142-0x00000000013C0000-0x0000000001EE6000-memory.dmp raccoon_v2 behavioral2/memory/1120-169-0x00000000013C0000-0x0000000001EE6000-memory.dmp raccoon_v2 -
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1120 a25fd13894644550fa9ca60a046813031e5189d4abe4bbd68ed9e6dcfc85d698.exe 1120 a25fd13894644550fa9ca60a046813031e5189d4abe4bbd68ed9e6dcfc85d698.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1120 a25fd13894644550fa9ca60a046813031e5189d4abe4bbd68ed9e6dcfc85d698.exe 1120 a25fd13894644550fa9ca60a046813031e5189d4abe4bbd68ed9e6dcfc85d698.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a25fd13894644550fa9ca60a046813031e5189d4abe4bbd68ed9e6dcfc85d698.exe"C:\Users\Admin\AppData\Local\Temp\a25fd13894644550fa9ca60a046813031e5189d4abe4bbd68ed9e6dcfc85d698.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1120