General
-
Target
7623696259.zip
-
Size
5.9MB
-
Sample
220630-mvz3naadbk
-
MD5
55dc2ebaf9c7e506fe638a711403c26a
-
SHA1
83a623066fc395cc0e60f6188a6d2a5cf2c996e0
-
SHA256
f18bb60d76f6ed5780ffd7f9c550c630d2be0afcadae7f2885cea2d52ec46104
-
SHA512
98e7fa6234759e10a02a8324dc5dc9c4492811514c41c82b151d9c25d4ab8af02bd98eabfb779bd9113562533dc98b99d6cf4bf0387df8c4f0e2083bc22eb9fc
Static task
static1
Behavioral task
behavioral1
Sample
5693684f6c7ff150ef25bdc69eefd0ec9464839accf87ffa92644cd7e410f9f4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5693684f6c7ff150ef25bdc69eefd0ec9464839accf87ffa92644cd7e410f9f4.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
recordbreaker
http://146.19.247.52/
http://77.91.102.115/
Targets
-
-
Target
5693684f6c7ff150ef25bdc69eefd0ec9464839accf87ffa92644cd7e410f9f4
-
Size
464.7MB
-
MD5
b957effe0c719182022ac9b46b043261
-
SHA1
07d7157fc342bda8bc403e33b36df39361b60818
-
SHA256
5693684f6c7ff150ef25bdc69eefd0ec9464839accf87ffa92644cd7e410f9f4
-
SHA512
1ce8a85296602a71ded0b168fe762254292ff282a9e08abcec3dc4bae68ff7a8b790351538149d92892cdff971778384308779a282c1e6d884f64cb2011269ab
Score10/10-
RecordBreaker
RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-