General

  • Target

    Setup1Crakedz.exe

  • Size

    19.3MB

  • Sample

    220629-xxpptacbgl

  • MD5

    d527fd56158f5b3bf43f58f0ab6d3cc7

  • SHA1

    d742a54b70dc0b95d9e823609d982bbe9d03f548

  • SHA256

    b22b77edf760cc0a9b0522be2ba51c9f252106881fc2175213d6290673ca49b6

  • SHA512

    d992ccb81231ae7d1ccc415344df1db5cfcf7d8afb5601a6bde5d10615c3715df4ed096def76451589c68a08d463f63b078d4b7ae40e8ed3a609fbe6527de6e8

Malware Config

Targets

    • Target

      Setup1Crakedz.exe

    • Size

      19.3MB

    • MD5

      d527fd56158f5b3bf43f58f0ab6d3cc7

    • SHA1

      d742a54b70dc0b95d9e823609d982bbe9d03f548

    • SHA256

      b22b77edf760cc0a9b0522be2ba51c9f252106881fc2175213d6290673ca49b6

    • SHA512

      d992ccb81231ae7d1ccc415344df1db5cfcf7d8afb5601a6bde5d10615c3715df4ed096def76451589c68a08d463f63b078d4b7ae40e8ed3a609fbe6527de6e8

    • RecordBreaker

      RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

    • suricata: ET MALWARE Generic Stealer Config Download Request

      suricata: ET MALWARE Generic Stealer Config Download Request

    • suricata: ET MALWARE Win32/RecordBreaker CnC Checkin

      suricata: ET MALWARE Win32/RecordBreaker CnC Checkin

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix

Tasks