General
-
Target
672fea64c92edc4d937d3132577b65813738bfddeab6a6b3ef35e6fa4b987009
-
Size
1.1MB
-
Sample
220621-dzbfesceg2
-
MD5
c3f533c47a2f995cd4b5d16653698609
-
SHA1
223cfb523ff8b64b339a34db3808dc6a386752a4
-
SHA256
672fea64c92edc4d937d3132577b65813738bfddeab6a6b3ef35e6fa4b987009
-
SHA512
6f6635c7864f675f0f9dfe315c5a7aeef93da7ca91b6016eed8506b7e1c809de8031f9659f87339f58e807a6d59b83214896af5ba71659b0b9e50511a1c91761
Static task
static1
Behavioral task
behavioral1
Sample
672fea64c92edc4d937d3132577b65813738bfddeab6a6b3ef35e6fa4b987009.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
672fea64c92edc4d937d3132577b65813738bfddeab6a6b3ef35e6fa4b987009.exe
Resource
win10-20220414-en
Malware Config
Extracted
recordbreaker
http://192.248.184.34/
http://140.82.52.55/
Extracted
arkei
Default
Targets
-
-
Target
672fea64c92edc4d937d3132577b65813738bfddeab6a6b3ef35e6fa4b987009
-
Size
1.1MB
-
MD5
c3f533c47a2f995cd4b5d16653698609
-
SHA1
223cfb523ff8b64b339a34db3808dc6a386752a4
-
SHA256
672fea64c92edc4d937d3132577b65813738bfddeab6a6b3ef35e6fa4b987009
-
SHA512
6f6635c7864f675f0f9dfe315c5a7aeef93da7ca91b6016eed8506b7e1c809de8031f9659f87339f58e807a6d59b83214896af5ba71659b0b9e50511a1c91761
Score10/10-
Raccoon ver2
Raccoon ver2.
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-