General

  • Target

    d2831378b440b653984e58ba82bd670f30eca0e4f23f14c248c50780883d32c3

  • Size

    405.2MB

  • Sample

    220621-edsm9adad4

  • MD5

    764c2ba4054203a47bd7304e84f04ff9

  • SHA1

    2e3fc72e4609492ecbbaf0872177e1e2d871b5c2

  • SHA256

    d2831378b440b653984e58ba82bd670f30eca0e4f23f14c248c50780883d32c3

  • SHA512

    3a493206825c4f39a45699820ea87f67ff0a7b6827cddc18064cab693c12add322c268663804714a2bec4bd31e9fbb3a0c5e083e109ab3b23bf7370230fa83e4

Malware Config

Extracted

Family

recordbreaker

C2

http://194.180.174.180/

Targets

    • Target

      d2831378b440b653984e58ba82bd670f30eca0e4f23f14c248c50780883d32c3

    • Size

      405.2MB

    • MD5

      764c2ba4054203a47bd7304e84f04ff9

    • SHA1

      2e3fc72e4609492ecbbaf0872177e1e2d871b5c2

    • SHA256

      d2831378b440b653984e58ba82bd670f30eca0e4f23f14c248c50780883d32c3

    • SHA512

      3a493206825c4f39a45699820ea87f67ff0a7b6827cddc18064cab693c12add322c268663804714a2bec4bd31e9fbb3a0c5e083e109ab3b23bf7370230fa83e4

    • Raccoon ver2

      Raccoon ver2.

    • RecordBreaker

      RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks