General

  • Target

    20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161

  • Size

    300KB

  • Sample

    220621-dt46jscda7

  • MD5

    5a7d42ef154a45a749d3ab174323f303

  • SHA1

    51bbb8e59761636e26c985f230d22d8282917594

  • SHA256

    20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161

  • SHA512

    7a6c2fb849cf6886f6a93f57e00db0159cbe1a9f8a592ce928b8e6cb25c5415b63ec8d55c54da8c32363447587f50721b8fccceaa6c3d91c37c400d72f25b4c7

Malware Config

Extracted

Family

recordbreaker

C2

http://51.195.166.201/

Targets

    • Target

      20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161

    • Size

      300KB

    • MD5

      5a7d42ef154a45a749d3ab174323f303

    • SHA1

      51bbb8e59761636e26c985f230d22d8282917594

    • SHA256

      20ca741b731753f1bc981bfceb747dc8f4afb2aeb8694de63114a53d23812161

    • SHA512

      7a6c2fb849cf6886f6a93f57e00db0159cbe1a9f8a592ce928b8e6cb25c5415b63ec8d55c54da8c32363447587f50721b8fccceaa6c3d91c37c400d72f25b4c7

    • Raccoon ver2

      Raccoon ver2.

    • RecordBreaker

      RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

    • suricata: ET MALWARE Generic Stealer Config Download Request

      suricata: ET MALWARE Generic Stealer Config Download Request

    • suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

      suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks