General
-
Target
a988a4f3652eaa34b874080da1cbb70223bac6760e318064f4f23b69bf823330
-
Size
4.1MB
-
Sample
220621-dtkrxaccg6
-
MD5
2ae15c4884a84f7b4f9fb4f461d6936c
-
SHA1
d4a55f83d824ae541212c714b842487f21270435
-
SHA256
a988a4f3652eaa34b874080da1cbb70223bac6760e318064f4f23b69bf823330
-
SHA512
ac54be94cb04914f6cbb4cba1c832b5a243cfc97cfa21334a3041b21b5ebbe3c4b1cbe7ca124eb85ccc2a6729db6a0b0942d955ed26c8e154e91815e40502c84
Static task
static1
Behavioral task
behavioral1
Sample
a988a4f3652eaa34b874080da1cbb70223bac6760e318064f4f23b69bf823330.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a988a4f3652eaa34b874080da1cbb70223bac6760e318064f4f23b69bf823330.exe
Resource
win10-20220414-en
Malware Config
Extracted
recordbreaker
http://5.252.22.62/
Targets
-
-
Target
a988a4f3652eaa34b874080da1cbb70223bac6760e318064f4f23b69bf823330
-
Size
4.1MB
-
MD5
2ae15c4884a84f7b4f9fb4f461d6936c
-
SHA1
d4a55f83d824ae541212c714b842487f21270435
-
SHA256
a988a4f3652eaa34b874080da1cbb70223bac6760e318064f4f23b69bf823330
-
SHA512
ac54be94cb04914f6cbb4cba1c832b5a243cfc97cfa21334a3041b21b5ebbe3c4b1cbe7ca124eb85ccc2a6729db6a0b0942d955ed26c8e154e91815e40502c84
Score10/10-
Raccoon ver2
Raccoon ver2.
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-