General

  • Target

    7623696259.zip

  • Size

    5.9MB

  • Sample

    220630-mvz3naadbk

  • MD5

    55dc2ebaf9c7e506fe638a711403c26a

  • SHA1

    83a623066fc395cc0e60f6188a6d2a5cf2c996e0

  • SHA256

    f18bb60d76f6ed5780ffd7f9c550c630d2be0afcadae7f2885cea2d52ec46104

  • SHA512

    98e7fa6234759e10a02a8324dc5dc9c4492811514c41c82b151d9c25d4ab8af02bd98eabfb779bd9113562533dc98b99d6cf4bf0387df8c4f0e2083bc22eb9fc

Malware Config

Extracted

Family

recordbreaker

C2

http://146.19.247.52/

http://77.91.102.115/

Targets

    • Target

      5693684f6c7ff150ef25bdc69eefd0ec9464839accf87ffa92644cd7e410f9f4

    • Size

      464.7MB

    • MD5

      b957effe0c719182022ac9b46b043261

    • SHA1

      07d7157fc342bda8bc403e33b36df39361b60818

    • SHA256

      5693684f6c7ff150ef25bdc69eefd0ec9464839accf87ffa92644cd7e410f9f4

    • SHA512

      1ce8a85296602a71ded0b168fe762254292ff282a9e08abcec3dc4bae68ff7a8b790351538149d92892cdff971778384308779a282c1e6d884f64cb2011269ab

    • RecordBreaker

      RecordBreaker is an information stealer capable of downloading and executing secondary payloads written in C++.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks