General
-
Target
0f6f25544771378db98a336aeb1ee7860d8d59e89c2e2263dc1554441f096a90
-
Size
3.3MB
-
Sample
220623-qzgnnafhg5
-
MD5
7d121365d2773c0c984128971791d548
-
SHA1
739b4e7b68fab6b3db139c6b42fc357d0e0882d3
-
SHA256
0f6f25544771378db98a336aeb1ee7860d8d59e89c2e2263dc1554441f096a90
-
SHA512
39da122fe1dff7eeed846536134f1284a0978aedf037978507cacc7dd326b5f0a9582547556b456915f6e988799c6af4440a7a3bd7c52279193cab4f94804db0
Static task
static1
Malware Config
Extracted
recordbreaker
http://51.210.87.110/
Targets
-
-
Target
0f6f25544771378db98a336aeb1ee7860d8d59e89c2e2263dc1554441f096a90
-
Size
3.3MB
-
MD5
7d121365d2773c0c984128971791d548
-
SHA1
739b4e7b68fab6b3db139c6b42fc357d0e0882d3
-
SHA256
0f6f25544771378db98a336aeb1ee7860d8d59e89c2e2263dc1554441f096a90
-
SHA512
39da122fe1dff7eeed846536134f1284a0978aedf037978507cacc7dd326b5f0a9582547556b456915f6e988799c6af4440a7a3bd7c52279193cab4f94804db0
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
suricata: ET MALWARE Recordbreaker Stealer CnC Checkin
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-