General

  • Target

    7633406149.zip

  • Size

    4.3MB

  • Sample

    220629-sf8n5scah9

  • MD5

    30695c368881324046a6c034b8734d15

  • SHA1

    37eb9f6638efaae27b7a29e5c0ed9f2d4b86d8af

  • SHA256

    8a08c5722a8b2e6a6c42ceb80a68a0552cfa8f65088a5c0fc8da95f8a2616ded

  • SHA512

    88e7f60e7e804d62fc48a535ebaa13df37611d8bb959f3c7e22e59d744eb11fcb0f60f5d133781ff9d98ab596c403ed7ccb43578d5b0c3eb87e40f798a04cf25

Malware Config

Extracted

Family

recordbreaker

C2

http://fall-hire.site/

http://45.67.34.234/

Targets

    • Target

      196ecaabd29b61e93823bf31e5e69c9c1159c413f1e0325babba4473d95c2a8b

    • Size

      4.5MB

    • MD5

      198509a8a53fdfe1c9b5d7fa936d895c

    • SHA1

      c0f78237d3d814de81f6d0f11e0d092d0b990523

    • SHA256

      196ecaabd29b61e93823bf31e5e69c9c1159c413f1e0325babba4473d95c2a8b

    • SHA512

      0b017aed1b0121706570b63c3103da759b21da94492a60a7c975c5a21c8888a84042d7210f1b9109cc7403c41d416c795e032cfd97c4123fdc3212992fccbd18

    • RecordBreaker

      RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

    • suricata: ET MALWARE Generic Stealer Config Download Request

      suricata: ET MALWARE Generic Stealer Config Download Request

    • suricata: ET MALWARE Win32/RecordBreaker CnC Checkin

      suricata: ET MALWARE Win32/RecordBreaker CnC Checkin

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks