General

  • Target

    ab3d8c58a33fd90eca17dc079eb05469bbe535b16eb653810f134df888e230ce

  • Size

    5.4MB

  • Sample

    220621-eaachaafhl

  • MD5

    298a8a69908571fb0aa37db11f042180

  • SHA1

    e127b71a42428afccb723ef357492df9b20dfe28

  • SHA256

    ab3d8c58a33fd90eca17dc079eb05469bbe535b16eb653810f134df888e230ce

  • SHA512

    1188c79240ddb3720fa3db360f4425fb351d7caa2e721c3e3e5dfc18bad75f8c1f47c94a87eada54f95217729829a18f320e41bd700ea84b19d7a29f013b67b2

Malware Config

Extracted

Family

recordbreaker

C2

http://tech-lover.xyz/

http://bevare-shame.xyz/

Targets

    • Target

      ab3d8c58a33fd90eca17dc079eb05469bbe535b16eb653810f134df888e230ce

    • Size

      5.4MB

    • MD5

      298a8a69908571fb0aa37db11f042180

    • SHA1

      e127b71a42428afccb723ef357492df9b20dfe28

    • SHA256

      ab3d8c58a33fd90eca17dc079eb05469bbe535b16eb653810f134df888e230ce

    • SHA512

      1188c79240ddb3720fa3db360f4425fb351d7caa2e721c3e3e5dfc18bad75f8c1f47c94a87eada54f95217729829a18f320e41bd700ea84b19d7a29f013b67b2

    • Raccoon ver2

      Raccoon ver2.

    • RecordBreaker

      RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks