General
-
Target
502f0a6587cf2d084e98f5edc12192e1ca37515bdf7364511415d615be2e6aa7
-
Size
65KB
-
Sample
220621-ed7r6sdad6
-
MD5
53dec7a3a6418bbc55d20e40e97a224c
-
SHA1
b6427092966218261138ad15a911f4cca5d9a69b
-
SHA256
502f0a6587cf2d084e98f5edc12192e1ca37515bdf7364511415d615be2e6aa7
-
SHA512
3f350abd77595b6e31b91448e1fc3d3a24e331b1496f8d3d90d32e99f94ac2cd0d72b9533d20d9a17d8e5a903b7908a987bee884b8b0ebdecb51be72947bc16f
Static task
static1
Behavioral task
behavioral1
Sample
502f0a6587cf2d084e98f5edc12192e1ca37515bdf7364511415d615be2e6aa7.exe
Resource
win7-20220414-en
Malware Config
Extracted
http://timekeeper.ug/ppx.ps1
Extracted
http://boundertime.ru/pps.ps1
Extracted
http://timebounder.ru/pps.ps1
Extracted
recordbreaker
http://136.244.65.99/
http://140.82.52.55/
Extracted
arkei
Default
Targets
-
-
Target
502f0a6587cf2d084e98f5edc12192e1ca37515bdf7364511415d615be2e6aa7
-
Size
65KB
-
MD5
53dec7a3a6418bbc55d20e40e97a224c
-
SHA1
b6427092966218261138ad15a911f4cca5d9a69b
-
SHA256
502f0a6587cf2d084e98f5edc12192e1ca37515bdf7364511415d615be2e6aa7
-
SHA512
3f350abd77595b6e31b91448e1fc3d3a24e331b1496f8d3d90d32e99f94ac2cd0d72b9533d20d9a17d8e5a903b7908a987bee884b8b0ebdecb51be72947bc16f
-
Raccoon ver2
Raccoon ver2.
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4
suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil
suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil
-
suricata: ET MALWARE Windows executable base64 encoded
suricata: ET MALWARE Windows executable base64 encoded
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-