MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1425fe43a0d680bc02644d3cea3f79e9dc2b3dae86610152429f53947ffd9814. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RecordBreaker


Vendor detections: 10


Intelligence 10 IOCs 1 YARA 2 File information Comments

SHA256 hash: 1425fe43a0d680bc02644d3cea3f79e9dc2b3dae86610152429f53947ffd9814
SHA3-384 hash: 604855e49fa6491db988b5bdcb734552c47107e115d44fb2923a676e989ccf27f40fdfa6391b1b1e759a479fcd269650
SHA1 hash: 4127d1456da4c6a4b777868922f83af4f1efb155
MD5 hash: 162afbdf5c47e676de0b22ff01023eaf
humanhash: single-gee-spaghetti-berlin
File name:162afbdf5c47e676de0b22ff01023eaf.exe
Download: download sample
Signature RecordBreaker
File size:983'968 bytes
First seen:2022-09-01 23:45:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 885c07b22374dc1137a9f063282ad390 (7 x RecordBreaker, 4 x RedLineStealer, 2 x Smoke Loader)
ssdeep 24576:uDWnHh8xtkkyuDg4SYJANcFO8no4wa7q1:nxkyuDgB2kx
TLSH T1E225AE2039D59532EDE2507A06ECF9324A6DE8F00B2186CF56CC57EE86246E13F37997
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:exe recordbreaker


Avatar
abuse_ch
RecordBreaker C2:
http://95.216.178.91/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://95.216.178.91/ https://threatfox.abuse.ch/ioc/847210/

Intelligence


File Origin
# of uploads :
1
# of downloads :
452
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
162afbdf5c47e676de0b22ff01023eaf.exe
Verdict:
No threats detected
Analysis date:
2022-09-01 23:47:47 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a file
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware mokes overlay packed raccoon wacatac
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon Stealer v2, RedLine, SmokeLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Benign windows process drops PE files
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates a thread in another existing process (thread injection)
DLL side loading technique detected
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 695936 Sample: SMBwexMaq6.exe Startdate: 02/09/2022 Architecture: WINDOWS Score: 100 83 ysanhumeg2.com 2->83 85 ysanhumeg1.com 2->85 87 4 other IPs or domains 2->87 103 Snort IDS alert for network traffic 2->103 105 Malicious sample detected (through community Yara rule) 2->105 107 Antivirus detection for URL or domain 2->107 109 6 other signatures 2->109 10 SMBwexMaq6.exe 1 2->10         started        13 edawfcd 2->13         started        signatures3 process4 signatures5 125 Writes to foreign memory regions 10->125 127 Allocates memory in foreign processes 10->127 129 Injects a PE file into a foreign processes 10->129 15 AppLaunch.exe 10->15         started        18 WerFault.exe 20 9 10->18         started        process6 file7 141 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 15->141 143 Maps a DLL or memory area into another process 15->143 145 Checks if the current machine is a virtual machine (disk enumeration) 15->145 147 Creates a thread in another existing process (thread injection) 15->147 21 explorer.exe 20 15->21 injected 65 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 18->65 dropped signatures8 process9 dnsIp10 97 ilabxctzzcbtw.top 85.193.86.99, 49702, 49703, 49704 KTK-TELECOMRU Russian Federation 21->97 99 www.woosang.co.uk 62.233.121.47, 443, 49709, 49712 IOMART-ASGB United Kingdom 21->99 101 10 other IPs or domains 21->101 75 C:\Users\user\AppData\Roaming\edawfcd, PE32 21->75 dropped 77 C:\Users\user\AppData\Local\Temp\F35F.exe, PE32 21->77 dropped 79 C:\Users\user\AppData\Local\Temp3BE.exe, PE32 21->79 dropped 81 7 other files (2 malicious) 21->81 dropped 117 System process connects to network (likely due to code injection or exploit) 21->117 119 Benign windows process drops PE files 21->119 121 Performs DNS queries to domains with low reputation 21->121 123 3 other signatures 21->123 26 E3BE.exe 21->26         started        29 F35F.exe 21->29         started        31 2D0F.exe 21->31         started        33 10 other processes 21->33 file11 signatures12 process13 file14 131 Machine Learning detection for dropped file 26->131 36 AppLaunch.exe 23 26->36         started        41 WerFault.exe 26->41         started        133 Multi AV Scanner detection for dropped file 29->133 135 Writes to foreign memory regions 29->135 137 Allocates memory in foreign processes 29->137 139 Injects a PE file into a foreign processes 29->139 43 AppLaunch.exe 2 29->43         started        45 WerFault.exe 29->45         started        47 AppLaunch.exe 31->47         started        49 WerFault.exe 31->49         started        57 C:\Users\user\AppData\...\remcmdstub.exe, PE32 33->57 dropped 59 C:\Users\user\AppData\Roaming\...\pcicapi.dll, PE32 33->59 dropped 61 C:\Users\user\AppData\...\msvcr100.dll, PE32 33->61 dropped 63 6 other files (none is malicious) 33->63 dropped 51 WerFault.exe 10 33->51         started        53 AppLaunch.exe 2 33->53         started        55 3 other processes 33->55 signatures15 process16 dnsIp17 89 46.249.58.152, 49716, 80 SERVERIUS-ASNL Netherlands 36->89 67 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 36->67 dropped 69 C:\Users\user\AppData\LocalLow\nss3.dll, PE32 36->69 dropped 71 C:\Users\user\AppData\LocalLow\mozglue.dll, PE32 36->71 dropped 73 4 other files (none is malicious) 36->73 dropped 111 Tries to harvest and steal browser information (history, passwords, etc) 36->111 113 DLL side loading technique detected 36->113 115 Tries to steal Crypto Currency Wallets 36->115 91 t.me 149.154.167.99, 443, 49740 TELEGRAMRU United Kingdom 47->91 93 116.202.180.202, 49745, 80 HETZNER-ASDE Germany 47->93 95 192.168.2.1 unknown unknown 51->95 file18 signatures19
Threat name:
Win32.Infostealer.Raccoon
Status:
Malicious
First seen:
2022-08-30 08:40:47 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
12 of 26 (46.15%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Unpacked files
SH256 hash:
719f1703811dba7a7e55bc6e999584600dfb23d0119ddb8182f1af3f7f8983e2
MD5 hash:
f9a2dae05e31069ef46b7a19ca90d67b
SHA1 hash:
6a3e73bea84b2cd85a2b37bfea3c720917d6d58a
Detections:
win_smokeloader_a2
SH256 hash:
1425fe43a0d680bc02644d3cea3f79e9dc2b3dae86610152429f53947ffd9814
MD5 hash:
162afbdf5c47e676de0b22ff01023eaf
SHA1 hash:
4127d1456da4c6a4b777868922f83af4f1efb155
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments