General
-
Target
setup.exe
-
Size
398.8MB
-
Sample
220628-v6peaschh2
-
MD5
1aa8b18e333b780fe844b1d02c809324
-
SHA1
670fa4aefb7a66dcb4141766c4d640744bbbf7e7
-
SHA256
3252f6acde19aa764d3545b47e3f72ef02cc857df9ced5c0f1b01b48acf81eef
-
SHA512
55e35593671b0e10e304c05fc41ff0aa681a75aec094d3b66c3495d0af9f545e39f0240b79778ad5dedde017d51e40c4925ccef1da39256e2ee35059fa846bab
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20220414-en
Malware Config
Extracted
recordbreaker
http://45.133.216.200/
http://45.133.216.71/
Targets
-
-
Target
setup.exe
-
Size
398.8MB
-
MD5
1aa8b18e333b780fe844b1d02c809324
-
SHA1
670fa4aefb7a66dcb4141766c4d640744bbbf7e7
-
SHA256
3252f6acde19aa764d3545b47e3f72ef02cc857df9ced5c0f1b01b48acf81eef
-
SHA512
55e35593671b0e10e304c05fc41ff0aa681a75aec094d3b66c3495d0af9f545e39f0240b79778ad5dedde017d51e40c4925ccef1da39256e2ee35059fa846bab
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic .bin download from Dotted Quad
suricata: ET MALWARE Generic .bin download from Dotted Quad
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-