General
-
Target
a28b0824e48b4ca32608126458bd5d345015cd5c2e380d479d7e43d72611fcc3
-
Size
1.9MB
-
Sample
220625-k31caagdf2
-
MD5
b0b47d69cc54b277235b470ba486c710
-
SHA1
c7f46aba6a3c8b929f322585dc162ae98129221d
-
SHA256
a28b0824e48b4ca32608126458bd5d345015cd5c2e380d479d7e43d72611fcc3
-
SHA512
5565c09d98017f3eb1065bbd1c3d7870a41e29597ed17f39eaebabc4cd1ee7255ef817a15643cc32ededacebfdeee4ebf7bcc5f08cfa55b50c48cf3e40392d9a
Static task
static1
Behavioral task
behavioral1
Sample
a28b0824e48b4ca32608126458bd5d345015cd5c2e380d479d7e43d72611fcc3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a28b0824e48b4ca32608126458bd5d345015cd5c2e380d479d7e43d72611fcc3.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
http://cutt.ly/zeyHqyH
http://cutt.ly/zeyHqyH
Extracted
recordbreaker
http://136.244.65.99/
http://140.82.52.55/
Extracted
arkei
Default
Targets
-
-
Target
a28b0824e48b4ca32608126458bd5d345015cd5c2e380d479d7e43d72611fcc3
-
Size
1.9MB
-
MD5
b0b47d69cc54b277235b470ba486c710
-
SHA1
c7f46aba6a3c8b929f322585dc162ae98129221d
-
SHA256
a28b0824e48b4ca32608126458bd5d345015cd5c2e380d479d7e43d72611fcc3
-
SHA512
5565c09d98017f3eb1065bbd1c3d7870a41e29597ed17f39eaebabc4cd1ee7255ef817a15643cc32ededacebfdeee4ebf7bcc5f08cfa55b50c48cf3e40392d9a
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4
suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4
-
suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil
suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-