MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3e3cae5883fb1aa3b277cdc2f030267828f9635830d77208a7bed268e3291bea. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RecordBreaker


Vendor detections: 14


Intelligence 14 IOCs YARA 4 File information Comments

SHA256 hash: 3e3cae5883fb1aa3b277cdc2f030267828f9635830d77208a7bed268e3291bea
SHA3-384 hash: 50d61a395878b64d8f9b6f727b4ebdc6a3ec115f09a797148a5990abdc0f6bb451edacd19ecd5773c12a6f7ebc0abe43
SHA1 hash: ed75001a1a9751cbb1cd782feae9aad2f959a910
MD5 hash: dff18091ee3be9ef3f0858bfd3f8f556
humanhash: double-glucose-lemon-neptune
File name:3e3cae5883fb1aa3b277cdc2f030267828f9635830d77208a7bed268e3291bea
Download: download sample
Signature RecordBreaker
File size:6'228'642 bytes
First seen:2022-07-25 22:21:46 UTC
Last seen:2022-07-27 17:27:13 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ab9ff6e4872ea2766a5f5c6af5649e9d (20 x CryptOne, 13 x RedLineStealer, 6 x RecordBreaker)
ssdeep 98304:1J4lNR5z/cY9/W002H/yo7MIvxeVJZozOfmGlIjaJ4h8wMs9D4VTZ1ZyORnDrWT:1J0NA4NV/nvEWzOfHlIjaMos14V5RnDK
TLSH T1C156337ABB8106BCD43C3D701DF2AD506A2D6D2316F586DB43413DE64271AF06E2E7A2
TrID 91.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.6% (.EXE) Win64 Executable (generic) (10523/12/4)
1.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
0.6% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon ec92b0f2e2b092ec (2 x RecordBreaker)
Reporter crep1x
Tags:exe recordbreaker vidar

Intelligence


File Origin
# of uploads :
2
# of downloads :
468
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a file
Creating a process with a hidden window
DNS request
Sending a custom TCP request
Sending an HTTP GET request
Creating a file in the %AppData% directory
Using the Windows Management Instrumentation requests
Running batch commands
Launching a process
Delayed reading of the file
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun by creating a file
Unauthorized injection to a browser process
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed setupapi.dll shdocvw.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Tandem Espionage
Verdict:
Malicious
Result
Threat name:
Nitol, Raccoon Stealer v2, RedLine, Vida
Detection:
malicious
Classification:
bank.troj.adwa.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Detected VMProtect packer
Drops PE files to the startup folder
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sets a auto configuration URL for Internet Explorer (IE settings are enforced automatically)
Sets debug register (to hijack the execution of another thread)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses ping.exe to check the status of other devices and networks
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected Nitol
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 673213 Sample: lcf3Tzgkw8 Startdate: 26/07/2022 Architecture: WINDOWS Score: 100 140 Snort IDS alert for network traffic 2->140 142 Malicious sample detected (through community Yara rule) 2->142 144 Antivirus detection for URL or domain 2->144 146 17 other signatures 2->146 9 lcf3Tzgkw8.exe 14 2->9         started        12 rundll32.exe 2->12         started        14 CzOqcj9PJhaWUrfa.exe 2->14         started        process3 file4 94 C:\Users\user\AppData\...\License Keys.exe, PE32 9->94 dropped 96 C:\Users\user\AppData\Local\Temp\...\losa.exe, PE32 9->96 dropped 98 C:\Users\user\AppData\Local\Temp\...\file.exe, PE32 9->98 dropped 100 3 other files (none is malicious) 9->100 dropped 17 file.exe 17 9->17         started        21 Install.exe 9->21         started        23 dngondon1.exe 3 9->23         started        25 License Keys.exe 2 9->25         started        27 rundll32.exe 12->27         started        162 Writes to foreign memory regions 14->162 164 Allocates memory in foreign processes 14->164 166 Creates a thread in another existing process (thread injection) 14->166 168 Injects a PE file into a foreign processes 14->168 signatures5 process6 dnsIp7 110 yesilyasam.eu 185.175.200.64, 443, 49759, 49761 ASTRALUSNL Netherlands 17->110 76 C:\Users\user\AppData\Roaming\00004823..exe, PE32 17->76 dropped 78 C:\Users\user\AppData\Roaming\00000029..exe, PE32 17->78 dropped 80 C:\Users\user\AppData\Local\...\fw3[1].exe, PE32 17->80 dropped 82 C:\Users\user\AppData\Local\...\fw4[1].exe, PE32 17->82 dropped 30 00004823..exe 17->30         started        34 00000029..exe 17->34         started        37 cmd.exe 17->37         started        84 C:\Program Files (x86)\...\tag12312341.exe, PE32 21->84 dropped 86 C:\Program Files (x86)\...\safert44.exe, PE32 21->86 dropped 92 6 other malicious files 21->92 dropped 45 10 other processes 21->45 88 C:\Users\user\AppData\Local\...\dngondon.exe, PE32 23->88 dropped 90 C:\Users\user\AppData\Local\...\logger 1.exe, PE32 23->90 dropped 39 dngondon.exe 1 23->39         started        41 logger 1.exe 15 3 23->41         started        47 2 other processes 25->47 148 Writes to foreign memory regions 27->148 150 Allocates memory in foreign processes 27->150 152 Creates a thread in another existing process (thread injection) 27->152 43 svchost.exe 27->43 injected 49 4 other processes 27->49 file8 signatures9 process10 dnsIp11 106 C:\Users\user\...\CzOqcj9PJhaWUrfa.exe, PE32 30->106 dropped 170 Drops PE files to the startup folder 30->170 172 Writes to foreign memory regions 30->172 174 Allocates memory in foreign processes 30->174 194 2 other signatures 30->194 68 4 other processes 30->68 112 87.251.77.179 HOSTKEY-ASNL Russian Federation 34->112 176 Tries to harvest and steal browser information (history, passwords, etc) 34->176 178 Tries to steal Crypto Currency Wallets 34->178 51 cmd.exe 34->51         started        180 Uses ping.exe to check the status of other devices and networks 37->180 53 PING.EXE 37->53         started        56 conhost.exe 37->56         started        182 Detected unpacking (changes PE section rights) 39->182 184 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 39->184 186 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 39->186 58 dngondon.exe 39->58         started        114 iplogger.org 148.251.234.83, 443, 49753 HETZNER-ASDE Germany 41->114 188 System process connects to network (likely due to code injection or exploit) 43->188 190 Sets debug register (to hijack the execution of another thread) 43->190 192 Modifies the context of a thread in another process (thread injection) 43->192 60 svchost.exe 43->60         started        116 103.89.90.61 VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN Viet Nam 45->116 118 192.168.2.5 unknown unknown 45->118 120 239.255.255.250 unknown Reserved 45->120 64 chrome.exe 45->64         started        70 7 other processes 45->70 122 v.xyzgamev.com 104.21.40.196, 443, 49751, 49752 CLOUDFLARENETUS United States 47->122 124 192.168.2.1 unknown unknown 47->124 108 C:\Users\user\AppData\Local\Temp\db.dll, PE32 47->108 dropped 66 conhost.exe 47->66         started        file12 signatures13 process14 dnsIp15 72 conhost.exe 51->72         started        74 timeout.exe 51->74         started        126 127.0.0.1 unknown unknown 53->126 128 15.235.171.56 HP-INTERNET-ASUS United States 58->128 130 208.95.112.1 TUT-ASUS United States 60->130 136 2 other IPs or domains 60->136 102 C:\Users\user\AppData\Local\...\Login Data.db, Unknown 60->102 dropped 104 C:\Users\user\AppData\Local\...\Cookies.db, Unknown 60->104 dropped 154 Query firmware table information (likely to detect VMs) 60->154 156 Installs new ROOT certificates 60->156 158 Sets a auto configuration URL for Internet Explorer (IE settings are enforced automatically) 60->158 160 Tries to harvest and steal browser information (history, passwords, etc) 60->160 132 142.250.184.237 GOOGLEUS United States 64->132 134 142.250.185.163 GOOGLEUS United States 64->134 138 6 other IPs or domains 64->138 file16 signatures17 process18
Threat name:
Win32.Trojan.Whispergate
Status:
Malicious
First seen:
2022-07-24 15:27:27 UTC
File Type:
PE (Exe)
Extracted files:
74
AV detection:
36 of 40 (90.00%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
redline
Score:
  10/10
Tags:
family:eternity family:redline botnet:4 botnet:@tag12312341 botnet:nam3 botnet:vukong collection discovery infostealer persistence spyware stealer vmprotect
Behaviour
Checks processor information in registry
Creates scheduled task(s)
Delays execution with timeout.exe
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Unexpected DNS network traffic destination
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
Detects Eternity stealer
Eternity
Process spawned unexpected child process
RedLine
RedLine payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Malware Config
C2 Extraction:
15.235.171.56:30730
103.89.90.61:18728
31.41.244.134:11643
62.204.41.144:14096
http://rlcjba7wduej3xcstcjo577eqgjsjvcjfsw4i23fqvf2y27ylylhmhad.onion
Unpacked files
SH256 hash:
e0eec0c067706cbfb574a7468593c5b4ccd740f8a509a0d14de05185cceeb3ab
MD5 hash:
7e342abbbc7c9ea9c18b655d53ac5148
SHA1 hash:
e4fb0c555e1befdc4e42d3699d9dc6cfe1dad168
SH256 hash:
e245c4a7d41e095b5c5136a89e698bd11e452594d864e250607cff2b2efadbab
MD5 hash:
6c991f5490cd23d8df31d89864395b21
SHA1 hash:
a6e3fde5d6f72fce36c5a8955a6025d92efb4356
SH256 hash:
3532741204df2f9f04dc6717dc17774eecb2b157577bba5eafdaf6943f841ec9
MD5 hash:
9d0566acca9d5ff8cb68779913668435
SHA1 hash:
074d5a054467c93b538c648e72ee0d71e42b5a72
SH256 hash:
4e5f4a021f712077e5d111451a5ee65efafbbd5e6a8a7da7e8cd235471da0590
MD5 hash:
64541d4e767bbb172a4970d0523324c1
SHA1 hash:
dc2326289d9e8030baa093bb1ed57ef58d766335
SH256 hash:
225a8241e24272a56a4693e62b21f76efd55a5ea1475a9a1439bb9b9a6dfbba7
MD5 hash:
02205b33e0905502c07c20dcd1d1e2ca
SHA1 hash:
b465d6426a7ad345daf210066faed75561c0dd5d
SH256 hash:
49005d06c933c3a49b506911e95483128f438202e842d25b7407e8d17cd880a4
MD5 hash:
7411a61bb1ebd3535cd876aabb03095e
SHA1 hash:
d7652e4f830e4c605b2c8a03e24a2f028bd8d2cd
SH256 hash:
3a07136d3e24e057fd369cc9a0c2ce505f25e69648dc3a5668f4c8ff3365453f
MD5 hash:
99384934ae3f864bc7c37fcc42f7836f
SHA1 hash:
d7692e7cfc4996ed090f315e9427406490b8f5b3
SH256 hash:
da8c0cad451eb622c2d817d710615dd0e4bc8d54e45cec88589a6b9309192f43
MD5 hash:
25288536ac8e7ddfcbbf422e378b8b75
SHA1 hash:
b2362399055d67a42ac0163b392d637a2c55530e
SH256 hash:
3e3cae5883fb1aa3b277cdc2f030267828f9635830d77208a7bed268e3291bea
MD5 hash:
dff18091ee3be9ef3f0858bfd3f8f556
SHA1 hash:
ed75001a1a9751cbb1cd782feae9aad2f959a910
Malware family:
BlackWorm
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments