General

  • Target

    9e5035f075d6aef29ad158c591adf669324a17442c575c6946c5a7f279705f47

  • Size

    4.6MB

  • Sample

    220621-eaxsssagbn

  • MD5

    9c6bae680b7a5c3f7a71e7998c95c909

  • SHA1

    f9b3c0b39eb17d54954dc248aa21f681ae58efb4

  • SHA256

    9e5035f075d6aef29ad158c591adf669324a17442c575c6946c5a7f279705f47

  • SHA512

    059337aa5cbb1209df24e13be812778874eed9534f2064251118f4760760d237a74bbaca152d147cc6aad057f79d92d9d429d69a27ba5e6c102a1a7f0a910eac

Malware Config

Targets

    • Target

      9e5035f075d6aef29ad158c591adf669324a17442c575c6946c5a7f279705f47

    • Size

      4.6MB

    • MD5

      9c6bae680b7a5c3f7a71e7998c95c909

    • SHA1

      f9b3c0b39eb17d54954dc248aa21f681ae58efb4

    • SHA256

      9e5035f075d6aef29ad158c591adf669324a17442c575c6946c5a7f279705f47

    • SHA512

      059337aa5cbb1209df24e13be812778874eed9534f2064251118f4760760d237a74bbaca152d147cc6aad057f79d92d9d429d69a27ba5e6c102a1a7f0a910eac

    • Raccoon ver2

      Raccoon ver2.

    • RecordBreaker

      RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

    • suricata: ET MALWARE Generic Stealer Config Download Request

      suricata: ET MALWARE Generic Stealer Config Download Request

    • suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

      suricata: ET MALWARE Recordbreaker Stealer CnC Checkin

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks