General
-
Target
83fd32cace2c2f243a713f93918dafd5458af296d55edd293cf5b8b927466dc7
-
Size
1.2MB
-
Sample
220621-dze4lsadbk
-
MD5
8225e7b33c0567edc128bfcfd1b0a436
-
SHA1
392c1c5599054b6e77e1599d04c17cfa8ad50bf5
-
SHA256
83fd32cace2c2f243a713f93918dafd5458af296d55edd293cf5b8b927466dc7
-
SHA512
696af8de58780e4fe619a9df3365015f44b060cef30ce2930892f9c5b1b91d87bfbbe9341341d5849bb59aac289d26e64be539977e688fc069231c908f638886
Static task
static1
Behavioral task
behavioral1
Sample
83fd32cace2c2f243a713f93918dafd5458af296d55edd293cf5b8b927466dc7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
83fd32cace2c2f243a713f93918dafd5458af296d55edd293cf5b8b927466dc7.exe
Resource
win10-20220414-en
Malware Config
Extracted
recordbreaker
http://45.140.146.169/
Targets
-
-
Target
83fd32cace2c2f243a713f93918dafd5458af296d55edd293cf5b8b927466dc7
-
Size
1.2MB
-
MD5
8225e7b33c0567edc128bfcfd1b0a436
-
SHA1
392c1c5599054b6e77e1599d04c17cfa8ad50bf5
-
SHA256
83fd32cace2c2f243a713f93918dafd5458af296d55edd293cf5b8b927466dc7
-
SHA512
696af8de58780e4fe619a9df3365015f44b060cef30ce2930892f9c5b1b91d87bfbbe9341341d5849bb59aac289d26e64be539977e688fc069231c908f638886
Score10/10-
Raccoon ver2
Raccoon ver2.
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-