MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0cca5a92d41a8ea26a8e4051cf62f6a7ab157461006f34bb139684c365dfc6f9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RecordBreaker


Vendor detections: 12


Intelligence 12 IOCs 1 YARA 4 File information Comments

SHA256 hash: 0cca5a92d41a8ea26a8e4051cf62f6a7ab157461006f34bb139684c365dfc6f9
SHA3-384 hash: 0735934f2cffbb000e696d3f0b47ec0ce406f7eaf50eef625644575dbbf15ef5080a44cb773e3505d356b1995dfc3186
SHA1 hash: 7f98e1135542ac1a2e9472628ef05c215bc50a7e
MD5 hash: 919b488e5754096f47c6782f8003a9fc
humanhash: vermont-arkansas-football-five
File name:0cca5a92d41a8ea26a8e4051cf62f6a7ab157461006f3.exe
Download: download sample
Signature RecordBreaker
File size:1'685'056 bytes
First seen:2022-10-27 15:50:43 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 5b48603033a0c33d10dca2b9788c33b7 (2 x RecordBreaker)
ssdeep 24576:MqhKdU8rhHxoiUFZYLV2FMZlYPk8SRVI0mtyLiTM1FmPdW3iNimgzK/BQL:MqcKm2JnmlYPpsV+tyLiGF3EiL
TLSH T1F77512157321AF27E012853054EF6FAF61687C183F0667EB9B1979037D30B663A660EE
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 71e0f08cece0f071 (1 x RecordBreaker)
Reporter abuse_ch
Tags:exe recordbreaker signed

Code Signing Certificate

Organisation:microsoft.com
Issuer:Microsoft Azure TLS Issuing CA 05
Algorithm:sha256WithRSAEncryption
Valid from:2022-10-20T07:08:50Z
Valid to:2023-10-15T07:08:50Z
Serial number: 33006225dcca7ed1024af548d40000006225dc
Intelligence: 3 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: 392dc98d1c387cf2a2f0e3d4fe4ddf7f0cd27b883afef0bbc0e27325fcb84db2
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
abuse_ch
RecordBreaker C2:
http://176.124.203.182/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://176.124.203.182/ https://threatfox.abuse.ch/ioc/950930/

Intelligence


File Origin
# of uploads :
1
# of downloads :
239
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
raccoon
ID:
1
File name:
0cca5a92d41a8ea26a8e4051cf62f6a7ab157461006f3.exe
Verdict:
Malicious activity
Analysis date:
2022-10-27 15:55:15 UTC
Tags:
trojan raccoon recordbreaker loader

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Launching a process
Sending an HTTP POST request
Sending an HTTP GET request
Creating a file
Reading critical registry keys
Stealing user critical data
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
EvasionGetTickCount
EvasionQueryPerformanceCounter
CheckCmdLine
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Raccoon Stealer
Verdict:
Malicious
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
68 / 100
Behaviour
Behavior Graph:
n/a
Threat name:
Win32.Spyware.Raccoonstealer
Status:
Malicious
First seen:
2022-10-27 13:41:13 UTC
File Type:
PE (Exe)
Extracted files:
28
AV detection:
16 of 25 (64.00%)
Threat level:
  2/5
Verdict:
malicious
Label(s):
raccoon
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Loads dropped DLL
Downloads MZ/PE file
Unpacked files
SH256 hash:
7654e9f497345691deb0b47f9ddd7f14077866d2bd6b1f5f5de230feb210ee58
MD5 hash:
ec272d00f5b7c162493e5a0f5f4e8abb
SHA1 hash:
a4dfd1a1308fa46dc6a51189a23d274ca04971e1
SH256 hash:
8e8da8743ef92f46c49bd8f2a5dc92d35516ff5542ca673a671a6b765310043b
MD5 hash:
20878b32ac84311fc08d353905077640
SHA1 hash:
8d2dc013a2a4bdead2203ff7a06335959b297f9f
SH256 hash:
0cca5a92d41a8ea26a8e4051cf62f6a7ab157461006f34bb139684c365dfc6f9
MD5 hash:
919b488e5754096f47c6782f8003a9fc
SHA1 hash:
7f98e1135542ac1a2e9472628ef05c215bc50a7e
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:RaccoonV2
Author:@_FirehaK <yara@firehak.com>
Description:Detects Raccoon Stealer version 2.0 (called Recordbreaker before attribution).
Reference:https://www.zerofox.com/blog/brief-raccoon-stealer-version-2-0/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RecordBreaker

Executable exe 0cca5a92d41a8ea26a8e4051cf62f6a7ab157461006f34bb139684c365dfc6f9

(this sample)

  
Delivery method
Distributed via web download

Comments