MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 22e2b816a20424bb37abf9cfc22605709173aa4208b9e383fe10266469b2f916. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RecordBreaker


Vendor detections: 14


Intelligence 14 IOCs YARA 2 File information Comments

SHA256 hash: 22e2b816a20424bb37abf9cfc22605709173aa4208b9e383fe10266469b2f916
SHA3-384 hash: 4acbc363c99cb009af1feae14f270bf62073bb4ccd373b1e8fb0d3e6ffac2f13a0edb74075e758778356d56176886c40
SHA1 hash: de4806e7b6308e29a56439ffadfbea3c152b592f
MD5 hash: 9b9c79caaffcd3cc93afad14f200108c
humanhash: grey-eight-tennessee-neptune
File name:9b9c79caaffcd3cc93afad14f200108c.exe
Download: download sample
Signature RecordBreaker
File size:14'124'032 bytes
First seen:2023-03-08 22:20:30 UTC
Last seen:2023-03-08 23:32:29 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 16cf5db3878b2dcf0f97ac9d337625cb (9 x RecordBreaker)
ssdeep 393216:kccC5cYkegfafcwvHgApo65UQea5MCjQXowha8xPgs:7cPdegfalY4oAJdc4mNgs
Threatray 2 similar samples on MalwareBazaar
TLSH T14DE623F561F91042E2A68E347FEA7D19B1F5355242C1973E708A29E52B32740321EFAF
TrID 28.5% (.EXE) Win16 NE executable (generic) (5038/12/1)
25.5% (.EXE) Win32 Executable (generic) (4505/5/1)
11.6% (.ICL) Windows Icons Library (generic) (2059/9)
11.5% (.EXE) OS/2 Executable (generic) (2029/13)
11.3% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon 9696b2baccf8b2cc (3 x RecordBreaker)
Reporter abuse_ch
Tags:exe recordbreaker


Avatar
abuse_ch
RecordBreaker C2:
http://83.217.11.32/

Intelligence


File Origin
# of uploads :
2
# of downloads :
318
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
raccoon
ID:
1
File name:
9b9c79caaffcd3cc93afad14f200108c.exe
Verdict:
Malicious activity
Analysis date:
2023-03-08 22:21:01 UTC
Tags:
raccoon recordbreaker trojan loader stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
overlay packed raccoon raccoonstealer
Result
Verdict:
MALICIOUS
Malware family:
Generic Malware
Verdict:
Malicious
Result
Threat name:
Raccoon Stealer v2
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Creates autostart registry keys with suspicious names
Hides threads from debuggers
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Snort IDS alert for network traffic
Tries to evade analysis by execution special instruction (VM detection)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Raccoon Stealer v2
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 822747 Sample: LLFrNWme9w.exe Startdate: 08/03/2023 Architecture: WINDOWS Score: 100 56 Snort IDS alert for network traffic 2->56 58 Antivirus detection for URL or domain 2->58 60 Multi AV Scanner detection for submitted file 2->60 62 4 other signatures 2->62 8 LLFrNWme9w.exe 30 2->8         started        13 USOPrivateOracle-tupe0.5.1.5.exe 2->13         started        process3 dnsIp4 40 77.73.134.24, 49685, 80 FIBEROPTIXDE Kazakhstan 8->40 42 83.217.11.32, 49679, 80 ATLEX-ASRU Russian Federation 8->42 44 77.73.134.35 FIBEROPTIXDE Kazakhstan 8->44 30 C:\Users\user\AppData\Roaming\Igwj58MZ.exe, PE32 8->30 dropped 32 C:\Users\user\AppData\Roaming\06432iIN.exe, PE32+ 8->32 dropped 34 C:\Users\user\AppData\LocalLow\sqlite3.dll, PE32 8->34 dropped 36 6 other files (4 malicious) 8->36 dropped 66 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 8->66 68 Tries to harvest and steal browser information (history, passwords, etc) 8->68 70 Tries to evade analysis by execution special instruction (VM detection) 8->70 72 2 other signatures 8->72 15 Igwj58MZ.exe 1 3 8->15         started        19 06432iIN.exe 8->19         started        file5 signatures6 process7 file8 38 C:\...\USOPrivateOracle-tupe0.5.1.5.exe, PE32 15->38 dropped 46 Antivirus detection for dropped file 15->46 48 Multi AV Scanner detection for dropped file 15->48 50 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 15->50 54 2 other signatures 15->54 21 USOPrivateOracle-tupe0.5.1.5.exe 15->21         started        52 Tries to harvest and steal browser information (history, passwords, etc) 19->52 24 cmd.exe 1 19->24         started        signatures9 process10 signatures11 64 Antivirus detection for dropped file 21->64 26 conhost.exe 24->26         started        28 choice.exe 1 24->28         started        process12
Threat name:
Win32.Spyware.Raccoonstealer
Status:
Malicious
First seen:
2023-03-05 22:09:00 UTC
File Type:
PE (Exe)
Extracted files:
18
AV detection:
17 of 39 (43.59%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of NtSetInformationThreadHideFromDebugger
Unpacked files
SH256 hash:
22e2b816a20424bb37abf9cfc22605709173aa4208b9e383fe10266469b2f916
MD5 hash:
9b9c79caaffcd3cc93afad14f200108c
SHA1 hash:
de4806e7b6308e29a56439ffadfbea3c152b592f
Malware family:
RecordBreaker
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:adonunix2
Author:Tim Brown @timb_machine
Description:AD on UNIX
Rule name:meth_get_eip
Author:Willi Ballenthin

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments