General
-
Target
ProtonVPN.msi
-
Size
1.5MB
-
Sample
220621-s7jjbshfa4
-
MD5
926ec22b8ba727571a2f85148489fd85
-
SHA1
e6cb03d143489f3af01575de4ea917b680109105
-
SHA256
aba77fcc24b7172206eda1a7f47eff0e0f2fe6ad988536d995ab38ee1a28e783
-
SHA512
c1a344377997ebb354d2bf0c916744a28723aa0845a4cb4a6b59eb6be4317f205386628b4a7bba5baba47203a628c843190de64532dc5496c8396a738da8407a
Static task
static1
Behavioral task
behavioral1
Sample
ProtonVPN.msi
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ProtonVPN.msi
Resource
win10v2004-20220414-en
Malware Config
Extracted
recordbreaker
http://142.132.229.12/
http://164.92.172.4/
Targets
-
-
Target
ProtonVPN.msi
-
Size
1.5MB
-
MD5
926ec22b8ba727571a2f85148489fd85
-
SHA1
e6cb03d143489f3af01575de4ea917b680109105
-
SHA256
aba77fcc24b7172206eda1a7f47eff0e0f2fe6ad988536d995ab38ee1a28e783
-
SHA512
c1a344377997ebb354d2bf0c916744a28723aa0845a4cb4a6b59eb6be4317f205386628b4a7bba5baba47203a628c843190de64532dc5496c8396a738da8407a
Score10/10-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-