General

  • Target

    PA$$w0rds_1234__NewFiles1--D7.rar

  • Size

    7.0MB

  • Sample

    220624-ndcfpseff5

  • MD5

    5c9500d898d976d9243898b0ba67b21f

  • SHA1

    8833235be13ef8a0595d4be071ac9ed5c98d2d0a

  • SHA256

    67d5bd624c4acc28929e75a96b3db6ebf46844cca982f8f583c3afb3019b55d5

  • SHA512

    8a9a1089d5e453159c73eae4e7f223da75509282fc224f1adee96c51f47fd003f8528146d53e9993518635e636e48452b64348fabbfaaa50c47d3d0e32464aae

Malware Config

Targets

    • Target

      SetupsCrakedz1.exe

    • Size

      727.1MB

    • MD5

      c3ab6595139a19d01767138ce83473db

    • SHA1

      a984f9b78958f6269fb6750dd8e0af1e5be069fa

    • SHA256

      bf6e8f78cea552f66a1185d3ca271d48f36f1a3e8573a18c28c8c780c51fa2d3

    • SHA512

      b145f47232823b4a9303e3330903f44d0df955d1258ce506cf382d6b8d16eb0cb73bd813c81fc82bda9b6195ef49e9a57a689ea7dbb3364d7157e9a4f32314e8

    • RecordBreaker

      RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

    • suricata: ET MALWARE Generic Stealer Config Download Request

      suricata: ET MALWARE Generic Stealer Config Download Request

    • suricata: ET MALWARE Win32/RecordBreaker CnC Checkin

      suricata: ET MALWARE Win32/RecordBreaker CnC Checkin

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks