General
-
Target
7648666163.zip
-
Size
4.2MB
-
Sample
220629-rxelysbhd4
-
MD5
35e60749380182dbaa31a0975d1dd2b6
-
SHA1
150f3be9efc84b473b6e5c056fa2b0fee80bc6d0
-
SHA256
ebd1d7a8456315b3d50a1e2f1e52b56bdeccdd061246a30684001530cda9709c
-
SHA512
d499a0f16fbc51fb9fadf1bb0b6a31d9ee4bf5d2afca2469856cc4e27d62ff47209a6ba027f2ec4996f06245e3e99868f5d865f2e91f421d5095815594520e6f
Behavioral task
behavioral1
Sample
02452298625f72e589fa74702ebc03ef85339c3ff0c48f3e61198853193abe6e.exe
Resource
win7-20220414-en
Malware Config
Extracted
recordbreaker
http://45.142.215.92/
http://violance-rave.site/
Targets
-
-
Target
02452298625f72e589fa74702ebc03ef85339c3ff0c48f3e61198853193abe6e
-
Size
4.3MB
-
MD5
6435d1210d21dea895dac8af278ca03a
-
SHA1
04dd34212a8b20c0fe73143e297f257dc565776d
-
SHA256
02452298625f72e589fa74702ebc03ef85339c3ff0c48f3e61198853193abe6e
-
SHA512
4c3e8d8a11b809c9883c88d3cf97da4cb594ac590b8752295a2a350fd35bd1f294985bcafe76da4d5aa5823abe9fc3b127d64406254cde116c5d64691a88effe
-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
suricata: ET MALWARE Generic Stealer Config Download Request
suricata: ET MALWARE Generic Stealer Config Download Request
-
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
suricata: ET MALWARE Win32/RecordBreaker CnC Checkin
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-