General

  • Target

    03a8531989aeeec1befecbba4f3ee218309306224bd22b7e52104537e32bacd6

  • Size

    5.2MB

  • Sample

    220621-dtvl4sabdr

  • MD5

    b1057feaae568f50eb9ff99a0fd2e545

  • SHA1

    b6e1d147b2f1564224a530b07af1681fa7a991e3

  • SHA256

    03a8531989aeeec1befecbba4f3ee218309306224bd22b7e52104537e32bacd6

  • SHA512

    c69024ff4629f752af10f2a628580d616ec6e4db1986e95a45b523c1f30b72c361ee12744a152c01e7ad8fadf68146d1ef42300b4f3556efa6eefa0e6259c482

Malware Config

Extracted

Family

recordbreaker

C2

http://51.195.166.175/

Targets

    • Target

      03a8531989aeeec1befecbba4f3ee218309306224bd22b7e52104537e32bacd6

    • Size

      5.2MB

    • MD5

      b1057feaae568f50eb9ff99a0fd2e545

    • SHA1

      b6e1d147b2f1564224a530b07af1681fa7a991e3

    • SHA256

      03a8531989aeeec1befecbba4f3ee218309306224bd22b7e52104537e32bacd6

    • SHA512

      c69024ff4629f752af10f2a628580d616ec6e4db1986e95a45b523c1f30b72c361ee12744a152c01e7ad8fadf68146d1ef42300b4f3556efa6eefa0e6259c482

    • Raccoon ver2

      Raccoon ver2.

    • RecordBreaker

      RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

    • suricata: ET MALWARE Generic Stealer Config Download Request

      suricata: ET MALWARE Generic Stealer Config Download Request

    • suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

      suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks