General
-
Target
d407dea31b4e55d9955bdea84e990205f7bbea67fd39e82bb61f942dc20e9b54
-
Size
523KB
-
Sample
220625-hc4wnshfdk
-
MD5
398ed7c0939e72a1df48196488ec00c8
-
SHA1
4f6f076492ead1416d1d64158117c8b50cac4e88
-
SHA256
d407dea31b4e55d9955bdea84e990205f7bbea67fd39e82bb61f942dc20e9b54
-
SHA512
4fb615c0aceec14063aba4da8cc105723cb1a480564eb95b70b4ebdfeb25a04cd80c0f07e47017ee5b0f2169f344e919e1f2f2a3c6f978fa074f8cf0a8439818
Static task
static1
Behavioral task
behavioral1
Sample
d407dea31b4e55d9955bdea84e990205f7bbea67fd39e82bb61f942dc20e9b54.exe
Resource
win10-20220414-en
Malware Config
Extracted
recordbreaker
http://2.58.56.247
Targets
-
-
Target
d407dea31b4e55d9955bdea84e990205f7bbea67fd39e82bb61f942dc20e9b54
-
Size
523KB
-
MD5
398ed7c0939e72a1df48196488ec00c8
-
SHA1
4f6f076492ead1416d1d64158117c8b50cac4e88
-
SHA256
d407dea31b4e55d9955bdea84e990205f7bbea67fd39e82bb61f942dc20e9b54
-
SHA512
4fb615c0aceec14063aba4da8cc105723cb1a480564eb95b70b4ebdfeb25a04cd80c0f07e47017ee5b0f2169f344e919e1f2f2a3c6f978fa074f8cf0a8439818
Score10/10-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Looks for VirtualBox Guest Additions in registry
-
Nirsoft
-
Executes dropped EXE
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-