General

  • Target

    e2b87b9ea8bb2bf835cb064845ff863253f3eedb4a88122598eee52c9579b203

  • Size

    2.2MB

  • Sample

    220621-dtn5bscch5

  • MD5

    fed9b76d03175742e23150bcd5ca8c6b

  • SHA1

    12a218cc80bd853cdd17c172a16f6440d2d1fd9b

  • SHA256

    e2b87b9ea8bb2bf835cb064845ff863253f3eedb4a88122598eee52c9579b203

  • SHA512

    4899e802fdb99e2a5f1997e910f87f9178a64c32d6c05da70acca8a2cb57136f6d0245c3ee489e65c501957f047a09c6a35812ce4fbdbd76cff713cc92b143b8

Malware Config

Extracted

Family

recordbreaker

C2

http://5.252.22.66/

Targets

    • Target

      e2b87b9ea8bb2bf835cb064845ff863253f3eedb4a88122598eee52c9579b203

    • Size

      2.2MB

    • MD5

      fed9b76d03175742e23150bcd5ca8c6b

    • SHA1

      12a218cc80bd853cdd17c172a16f6440d2d1fd9b

    • SHA256

      e2b87b9ea8bb2bf835cb064845ff863253f3eedb4a88122598eee52c9579b203

    • SHA512

      4899e802fdb99e2a5f1997e910f87f9178a64c32d6c05da70acca8a2cb57136f6d0245c3ee489e65c501957f047a09c6a35812ce4fbdbd76cff713cc92b143b8

    • Raccoon ver2

      Raccoon ver2.

    • RecordBreaker

      RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

    • suricata: ET MALWARE Generic Stealer Config Download Request

      suricata: ET MALWARE Generic Stealer Config Download Request

    • suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

      suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks