General

  • Target

    b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe

  • Size

    991KB

  • Sample

    220627-rbthzsbgeq

  • MD5

    dd7c0c58450314880d48eeece29c0fd4

  • SHA1

    ea3c53e23a5ced8a6f01c96e7837597e62899bbb

  • SHA256

    b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9

  • SHA512

    e6322a123e1783ead529049ef3b888cd8750ed3815e7725ea1c249e3c5797f0944e37eb6055df867d43db8a85845177330ef9e4b9a085034f065347c6e2d5a4b

Malware Config

Extracted

Family

recordbreaker

C2

http://146.70.124.71

Targets

    • Target

      b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9.exe

    • Size

      991KB

    • MD5

      dd7c0c58450314880d48eeece29c0fd4

    • SHA1

      ea3c53e23a5ced8a6f01c96e7837597e62899bbb

    • SHA256

      b03a3100651c153d710c4f4778cb428c3723d936c428e757b7d17354243eacb9

    • SHA512

      e6322a123e1783ead529049ef3b888cd8750ed3815e7725ea1c249e3c5797f0944e37eb6055df867d43db8a85845177330ef9e4b9a085034f065347c6e2d5a4b

    • RecordBreaker

      RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

    • suricata: ET MALWARE Generic Stealer Config Download Request

      suricata: ET MALWARE Generic Stealer Config Download Request

    • suricata: ET MALWARE Win32/RecordBreaker CnC Checkin

      suricata: ET MALWARE Win32/RecordBreaker CnC Checkin

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks