General

  • Target

    9014f5d4a597cdec4ec2d10bf73883b4f0106f62c9938a8c6a59e506b1203e2b

  • Size

    7.0MB

  • Sample

    220621-dv1vhsabhr

  • MD5

    9996506af2fdc925020d9c09eb064701

  • SHA1

    c368f05d588e40c2e22ff6f7a1bafb3e4123d1d4

  • SHA256

    9014f5d4a597cdec4ec2d10bf73883b4f0106f62c9938a8c6a59e506b1203e2b

  • SHA512

    27a931a2730b28d19f111672a138558025ef560da50c01f111ada300f5a08b999360e1433a6363fc79dc328a38bbf51948c7826a5e4626dfe9efe193bfd655a5

Malware Config

Targets

    • Target

      9014f5d4a597cdec4ec2d10bf73883b4f0106f62c9938a8c6a59e506b1203e2b

    • Size

      7.0MB

    • MD5

      9996506af2fdc925020d9c09eb064701

    • SHA1

      c368f05d588e40c2e22ff6f7a1bafb3e4123d1d4

    • SHA256

      9014f5d4a597cdec4ec2d10bf73883b4f0106f62c9938a8c6a59e506b1203e2b

    • SHA512

      27a931a2730b28d19f111672a138558025ef560da50c01f111ada300f5a08b999360e1433a6363fc79dc328a38bbf51948c7826a5e4626dfe9efe193bfd655a5

    • Raccoon ver2

      Raccoon ver2.

    • RecordBreaker

      RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

    • suricata: ET MALWARE Generic Stealer Config Download Request

      suricata: ET MALWARE Generic Stealer Config Download Request

    • suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

      suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks