General
-
Target
d2831378b440b653984e58ba82bd670f30eca0e4f23f14c248c50780883d32c3
-
Size
405.2MB
-
Sample
220621-edsm9adad4
-
MD5
764c2ba4054203a47bd7304e84f04ff9
-
SHA1
2e3fc72e4609492ecbbaf0872177e1e2d871b5c2
-
SHA256
d2831378b440b653984e58ba82bd670f30eca0e4f23f14c248c50780883d32c3
-
SHA512
3a493206825c4f39a45699820ea87f67ff0a7b6827cddc18064cab693c12add322c268663804714a2bec4bd31e9fbb3a0c5e083e109ab3b23bf7370230fa83e4
Static task
static1
Behavioral task
behavioral1
Sample
d2831378b440b653984e58ba82bd670f30eca0e4f23f14c248c50780883d32c3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
d2831378b440b653984e58ba82bd670f30eca0e4f23f14c248c50780883d32c3.exe
Resource
win10-20220414-en
Malware Config
Extracted
recordbreaker
http://194.180.174.180/
Targets
-
-
Target
d2831378b440b653984e58ba82bd670f30eca0e4f23f14c248c50780883d32c3
-
Size
405.2MB
-
MD5
764c2ba4054203a47bd7304e84f04ff9
-
SHA1
2e3fc72e4609492ecbbaf0872177e1e2d871b5c2
-
SHA256
d2831378b440b653984e58ba82bd670f30eca0e4f23f14c248c50780883d32c3
-
SHA512
3a493206825c4f39a45699820ea87f67ff0a7b6827cddc18064cab693c12add322c268663804714a2bec4bd31e9fbb3a0c5e083e109ab3b23bf7370230fa83e4
Score10/10-
Raccoon ver2
Raccoon ver2.
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-