General
-
Target
zxcv.EXElwmyfpvl
-
Size
772KB
-
Sample
220626-g4krfabgg8
-
MD5
d946c183fd128b4acf88d83ee89d79d3
-
SHA1
6f35da72f339c7101e93a7adada27d24902db598
-
SHA256
529586cbbd8586d7f33a3ea9bdd517b7ead617b4e12165106e81e4bfad859474
-
SHA512
793727b08b92df108144308a7ac798e55ba35742308db18466cce6caa564b6c1cb5b0fece2850511450f69e497df1dba49a9cb3a0ff17b4f9cc27e05ef2fcd62
Static task
static1
Behavioral task
behavioral1
Sample
zxcv.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
zxcv.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
recordbreaker
http://136.244.65.99/
http://140.82.52.55/
Extracted
arkei
Default
Targets
-
-
Target
zxcv.EXElwmyfpvl
-
Size
772KB
-
MD5
d946c183fd128b4acf88d83ee89d79d3
-
SHA1
6f35da72f339c7101e93a7adada27d24902db598
-
SHA256
529586cbbd8586d7f33a3ea9bdd517b7ead617b4e12165106e81e4bfad859474
-
SHA512
793727b08b92df108144308a7ac798e55ba35742308db18466cce6caa564b6c1cb5b0fece2850511450f69e497df1dba49a9cb3a0ff17b4f9cc27e05ef2fcd62
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4
suricata: ET MALWARE Base64 Encoded Stealer Config from Server - APPDATA or USERPROFILE Environment Variable M4
-
suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil
suricata: ET MALWARE Win32/Vidar Variant/Mars Stealer CnC Exfil
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-