Analysis
-
max time kernel
164s -
max time network
179s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
21-06-2022 03:44
Static task
static1
Behavioral task
behavioral1
Sample
6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exe
Resource
win10-20220414-en
General
-
Target
6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exe
-
Size
7.4MB
-
MD5
7ecdf36bd30c2d9653ea31b6baf32910
-
SHA1
b1d6c01c397924f2324091261bb4f29156a58f0a
-
SHA256
6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0
-
SHA512
1c3402096ab086239e39931c1587ab7c31172faf6307aad396683e0ea7ec6df24f7dbc1b2307fa099fe5d66c592864563217aced68bb9a106978d8b1086b2c88
Malware Config
Signatures
-
Raccoon ver2 4 IoCs
Raccoon ver2.
Processes:
resource yara_rule behavioral2/memory/2064-139-0x00000000011B0000-0x0000000001D30000-memory.dmp raccoon_v2 behavioral2/memory/2064-140-0x00000000011B0000-0x0000000001D30000-memory.dmp raccoon_v2 behavioral2/memory/2064-170-0x00000000011B0000-0x0000000001D30000-memory.dmp raccoon_v2 behavioral2/memory/2064-175-0x00000000011B0000-0x0000000001D30000-memory.dmp raccoon_v2 -
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exepid Process 2064 6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exe 2064 6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exepid Process 2064 6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exe 2064 6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exe"C:\Users\Admin\AppData\Local\Temp\6dfd4a12437cf38a4ecdb24891dbff464602fcbe435cf6c15a643637d7f4e1b0.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2064