General

  • Target

    83fd32cace2c2f243a713f93918dafd5458af296d55edd293cf5b8b927466dc7

  • Size

    1.2MB

  • Sample

    220621-dze4lsadbk

  • MD5

    8225e7b33c0567edc128bfcfd1b0a436

  • SHA1

    392c1c5599054b6e77e1599d04c17cfa8ad50bf5

  • SHA256

    83fd32cace2c2f243a713f93918dafd5458af296d55edd293cf5b8b927466dc7

  • SHA512

    696af8de58780e4fe619a9df3365015f44b060cef30ce2930892f9c5b1b91d87bfbbe9341341d5849bb59aac289d26e64be539977e688fc069231c908f638886

Malware Config

Extracted

Family

recordbreaker

C2

http://45.140.146.169/

Targets

    • Target

      83fd32cace2c2f243a713f93918dafd5458af296d55edd293cf5b8b927466dc7

    • Size

      1.2MB

    • MD5

      8225e7b33c0567edc128bfcfd1b0a436

    • SHA1

      392c1c5599054b6e77e1599d04c17cfa8ad50bf5

    • SHA256

      83fd32cace2c2f243a713f93918dafd5458af296d55edd293cf5b8b927466dc7

    • SHA512

      696af8de58780e4fe619a9df3365015f44b060cef30ce2930892f9c5b1b91d87bfbbe9341341d5849bb59aac289d26e64be539977e688fc069231c908f638886

    • Raccoon ver2

      Raccoon ver2.

    • RecordBreaker

      RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks