General
-
Target
PA$$w0rds_1234__NewFiles1--D7.rar
-
Size
7.0MB
-
Sample
220624-ndcfpseff5
-
MD5
5c9500d898d976d9243898b0ba67b21f
-
SHA1
8833235be13ef8a0595d4be071ac9ed5c98d2d0a
-
SHA256
67d5bd624c4acc28929e75a96b3db6ebf46844cca982f8f583c3afb3019b55d5
-
SHA512
8a9a1089d5e453159c73eae4e7f223da75509282fc224f1adee96c51f47fd003f8528146d53e9993518635e636e48452b64348fabbfaaa50c47d3d0e32464aae
Static task
static1
Behavioral task
behavioral1
Sample
SetupsCrakedz1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SetupsCrakedz1.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
SetupsCrakedz1.exe
-
Size
727.1MB
-
MD5
c3ab6595139a19d01767138ce83473db
-
SHA1
a984f9b78958f6269fb6750dd8e0af1e5be069fa
-
SHA256
bf6e8f78cea552f66a1185d3ca271d48f36f1a3e8573a18c28c8c780c51fa2d3
-
SHA512
b145f47232823b4a9303e3330903f44d0df955d1258ce506cf382d6b8d16eb0cb73bd813c81fc82bda9b6195ef49e9a57a689ea7dbb3364d7157e9a4f32314e8
Score10/10-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-