MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 58471946c593e0d10006f978acd9327ca7d94f0dbbe775492bdf141bba5a70ce. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RecordBreaker


Vendor detections: 14


Intelligence 14 IOCs YARA 4 File information Comments

SHA256 hash: 58471946c593e0d10006f978acd9327ca7d94f0dbbe775492bdf141bba5a70ce
SHA3-384 hash: 3cd7c55207ba34f7cb56ea5c1c7c27ca97cf34fd58ed9fbfec6baea51d5364641f54cfff3905d9e859c55da2219aad94
SHA1 hash: e1ef84f43fba09bb7b946fb7aaaec8ae623ebf24
MD5 hash: 50e28ad57ff32ad105636b6ef9dc8711
humanhash: coffee-romeo-helium-orange
File name:58471946c593e0d10006f978acd9327ca7d94f0dbbe775492bdf141bba5a70ce
Download: download sample
Signature RecordBreaker
File size:6'361'029 bytes
First seen:2022-07-25 22:21:57 UTC
Last seen:2022-07-27 17:27:11 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash ab9ff6e4872ea2766a5f5c6af5649e9d (20 x CryptOne, 13 x RedLineStealer, 6 x RecordBreaker)
ssdeep 196608:1JZN8EBEct/WzOfHlIjaMos14V5RnDrW9:HFt/WzOvy7osiV5Rn29
TLSH T13F5633797B8506BCD43C3DB02CA2EE50266D1D2312F5969F43417DEA42B1EF06E2BB91
TrID 91.0% (.EXE) WinRAR Self Extracting archive (4.x-5.x) (265042/9/39)
3.6% (.EXE) Win64 Executable (generic) (10523/12/4)
1.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
1.5% (.EXE) Win32 Executable (generic) (4505/5/1)
0.6% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon ec92b0f2e2b092ec (2 x RecordBreaker)
Reporter crep1x
Tags:exe recordbreaker vidar

Intelligence


File Origin
# of uploads :
2
# of downloads :
473
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file in the %temp% subdirectories
Creating a process from a recently created file
Creating a file
DNS request
Sending a custom TCP request
Creating a process with a hidden window
Sending an HTTP GET request
Using the Windows Management Instrumentation requests
Creating a file in the %AppData% directory
Launching a process
Running batch commands
Delayed reading of the file
Launching the default Windows debugger (dwwin.exe)
Unauthorized injection to a recently created process
Unauthorized injection to a recently created process by context flags manipulation
Enabling autorun by creating a file
Unauthorized injection to a browser process
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  6/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
EvasionQueryPerformanceCounter
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
greyware overlay packed setupapi.dll shdocvw.dll shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Tandem Espionage
Verdict:
Malicious
Result
Threat name:
CryptOne, Eternity Stealer, Nitol, Racco
Detection:
malicious
Classification:
bank.troj.adwa.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Creates processes via WMI
Detected unpacking (changes PE section rights)
Detected VMProtect packer
Drops PE files to the startup folder
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
PE file has nameless sections
Query firmware table information (likely to detect VMs)
Searches for specific processes (likely to inject)
Sets a auto configuration URL for Internet Explorer (IE settings are enforced automatically)
Sets debug register (to hijack the execution of another thread)
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses ping.exe to check the status of other devices and networks
Writes to foreign memory regions
Yara detected CryptOne packer
Yara detected Eternity Stealer
Yara detected Generic Downloader
Yara detected Nitol
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 673207 Sample: 4DzsyfKwF8 Startdate: 26/07/2022 Architecture: WINDOWS Score: 100 125 146.19.247.91 FITC-ASUS France 2->125 127 208.95.112.1 TUT-ASUS United States 2->127 159 Snort IDS alert for network traffic 2->159 161 Malicious sample detected (through community Yara rule) 2->161 163 Antivirus detection for URL or domain 2->163 165 17 other signatures 2->165 10 4DzsyfKwF8.exe 14 2->10         started        14 rundll32.exe 2->14         started        signatures3 process4 file5 93 C:\Users\user\AppData\...\Filmora 11.exe, PE32 10->93 dropped 95 C:\Users\user\AppData\Local\...\loaps.exe, PE32 10->95 dropped 97 C:\Users\user\AppData\Local\Temp\...\file.exe, PE32 10->97 dropped 99 3 other files (none is malicious) 10->99 dropped 173 Contains functionality to inject threads in other processes 10->173 175 Searches for specific processes (likely to inject) 10->175 16 file.exe 19 10->16         started        20 Install.exe 10->20         started        22 dngondon1.exe 3 10->22         started        24 Filmora 11.exe 2 10->24         started        26 rundll32.exe 14->26         started        signatures6 process7 dnsIp8 109 yesilyasam.eu 185.175.200.64, 443, 49774, 49776 ASTRALUSNL Netherlands 16->109 75 C:\Users\user\AppData\Roaming\00004823..exe, PE32 16->75 dropped 77 C:\Users\user\AppData\Roaming\00000029..exe, PE32 16->77 dropped 79 C:\Users\user\AppData\Local\...\fw4[1].exe, PE32 16->79 dropped 81 C:\Users\user\AppData\Local\...\fw3[1].exe, PE32 16->81 dropped 29 00004823..exe 16->29         started        33 00000029..exe 16->33         started        36 cmd.exe 16->36         started        83 C:\Program Files (x86)\...\tag12312341.exe, PE32 20->83 dropped 85 C:\Program Files (x86)\...\safert44.exe, PE32 20->85 dropped 91 7 other malicious files 20->91 dropped 44 9 other processes 20->44 87 C:\Users\user\AppData\Local\...\dngondon.exe, PE32 22->87 dropped 89 C:\Users\user\AppData\Local\...\logger 1.exe, PE32 22->89 dropped 38 dngondon.exe 1 22->38         started        40 logger 1.exe 15 3 22->40         started        46 2 other processes 24->46 167 Writes to foreign memory regions 26->167 169 Allocates memory in foreign processes 26->169 171 Creates a thread in another existing process (thread injection) 26->171 42 svchost.exe 26->42 injected 48 3 other processes 26->48 file9 signatures10 process11 dnsIp12 101 C:\Users\user\...\WdrkXM9ttZCrFlWk.exe, PE32 29->101 dropped 177 Drops PE files to the startup folder 29->177 179 Writes to foreign memory regions 29->179 181 Allocates memory in foreign processes 29->181 197 2 other signatures 29->197 50 WdrkXM9ttZCrFlWk.exe 29->50         started        67 4 other processes 29->67 111 87.251.77.179 HOSTKEY-ASNL Russian Federation 33->111 183 Tries to harvest and steal browser information (history, passwords, etc) 33->183 185 Tries to steal Crypto Currency Wallets 33->185 53 cmd.exe 33->53         started        187 Uses ping.exe to check the status of other devices and networks 36->187 55 PING.EXE 36->55         started        58 conhost.exe 36->58         started        189 Detected unpacking (changes PE section rights) 38->189 60 dngondon.exe 38->60         started        113 iplogger.org 148.251.234.83, 443, 49773 HETZNER-ASDE Germany 40->113 115 74.125.108.199 GOOGLEUS United States 42->115 119 2 other IPs or domains 42->119 191 System process connects to network (likely due to code injection or exploit) 42->191 193 Sets debug register (to hijack the execution of another thread) 42->193 195 Modifies the context of a thread in another process (thread injection) 42->195 62 svchost.exe 42->62         started        117 192.168.2.7, 443, 49722, 49760 unknown unknown 44->117 121 5 other IPs or domains 44->121 103 C:\...\pnacl_public_x86_64_pnacl_sz_nexe, ELF 44->103 dropped 69 2 other processes 44->69 123 2 other IPs or domains 46->123 105 C:\Users\user\AppData\Local\Temp\db.dll, PE32 46->105 dropped 65 conhost.exe 46->65         started        file13 signatures14 process15 dnsIp16 143 Writes to foreign memory regions 50->143 145 Allocates memory in foreign processes 50->145 147 Creates a thread in another existing process (thread injection) 50->147 149 Injects a PE file into a foreign processes 50->149 71 conhost.exe 53->71         started        73 timeout.exe 53->73         started        129 127.0.0.1 unknown unknown 55->129 131 15.235.171.56 HP-INTERNET-ASUS United States 60->131 133 toa.mygametoa.com 34.64.183.91 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 62->133 135 172.67.161.69 CLOUDFLARENETUS United States 62->135 107 C:\Users\user\AppData\Local\...\Login Data.db, SQLite 62->107 dropped 151 Query firmware table information (likely to detect VMs) 62->151 153 Installs new ROOT certificates 62->153 155 Sets a auto configuration URL for Internet Explorer (IE settings are enforced automatically) 62->155 157 Tries to harvest and steal browser information (history, passwords, etc) 62->157 137 142.250.181.227 GOOGLEUS United States 69->137 139 142.250.184.237 GOOGLEUS United States 69->139 141 6 other IPs or domains 69->141 file17 signatures18 process19
Threat name:
Win32.Trojan.Whispergate
Status:
Malicious
First seen:
2022-07-25 16:06:57 UTC
File Type:
PE (Exe)
Extracted files:
72
AV detection:
36 of 39 (92.31%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:eternity family:redline family:vidar botnet:1521 botnet:4 botnet:@tag12312341 botnet:nam3 botnet:vukong collection discovery infostealer persistence spyware stealer vmprotect
Behaviour
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Modifies data under HKEY_USERS
Modifies registry class
Modifies system certificate store
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
Drops file in Program Files directory
Drops file in Windows directory
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses 2FA software files, possible credential harvesting
Accesses Microsoft Outlook profiles
Accesses cryptocurrency files/wallets, possible credential harvesting
Adds Run key to start application
Checks installed software on the system
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Drops startup file
Loads dropped DLL
Reads user/profile data of web browsers
Unexpected DNS network traffic destination
Downloads MZ/PE file
Executes dropped EXE
VMProtect packed file
Detects Eternity stealer
Eternity
Process spawned unexpected child process
RedLine
RedLine payload
Suspicious use of NtCreateUserProcessOtherParentProcess
Vidar
Malware Config
C2 Extraction:
15.235.171.56:30730
103.89.90.61:18728
31.41.244.134:11643
62.204.41.144:14096
http://rlcjba7wduej3xcstcjo577eqgjsjvcjfsw4i23fqvf2y27ylylhmhad.onion
https://t.me/korstonsales
https://climatejustice.social/@ffoleg94
Unpacked files
SH256 hash:
e0eec0c067706cbfb574a7468593c5b4ccd740f8a509a0d14de05185cceeb3ab
MD5 hash:
7e342abbbc7c9ea9c18b655d53ac5148
SHA1 hash:
e4fb0c555e1befdc4e42d3699d9dc6cfe1dad168
SH256 hash:
e245c4a7d41e095b5c5136a89e698bd11e452594d864e250607cff2b2efadbab
MD5 hash:
6c991f5490cd23d8df31d89864395b21
SHA1 hash:
a6e3fde5d6f72fce36c5a8955a6025d92efb4356
SH256 hash:
3532741204df2f9f04dc6717dc17774eecb2b157577bba5eafdaf6943f841ec9
MD5 hash:
9d0566acca9d5ff8cb68779913668435
SHA1 hash:
074d5a054467c93b538c648e72ee0d71e42b5a72
SH256 hash:
4e5f4a021f712077e5d111451a5ee65efafbbd5e6a8a7da7e8cd235471da0590
MD5 hash:
64541d4e767bbb172a4970d0523324c1
SHA1 hash:
dc2326289d9e8030baa093bb1ed57ef58d766335
SH256 hash:
225a8241e24272a56a4693e62b21f76efd55a5ea1475a9a1439bb9b9a6dfbba7
MD5 hash:
02205b33e0905502c07c20dcd1d1e2ca
SHA1 hash:
b465d6426a7ad345daf210066faed75561c0dd5d
SH256 hash:
49005d06c933c3a49b506911e95483128f438202e842d25b7407e8d17cd880a4
MD5 hash:
7411a61bb1ebd3535cd876aabb03095e
SHA1 hash:
d7652e4f830e4c605b2c8a03e24a2f028bd8d2cd
SH256 hash:
3a07136d3e24e057fd369cc9a0c2ce505f25e69648dc3a5668f4c8ff3365453f
MD5 hash:
99384934ae3f864bc7c37fcc42f7836f
SHA1 hash:
d7692e7cfc4996ed090f315e9427406490b8f5b3
SH256 hash:
a08e7e5b768fc124e6073e9bb137371d02f7701d6f54d84bfd30b4fcb550179c
MD5 hash:
69c6e983a812548a077065b89390b1f0
SHA1 hash:
223c6cb0c9355373d64ff8f51e75d65eacfec1be
SH256 hash:
58471946c593e0d10006f978acd9327ca7d94f0dbbe775492bdf141bba5a70ce
MD5 hash:
50e28ad57ff32ad105636b6ef9dc8711
SHA1 hash:
e1ef84f43fba09bb7b946fb7aaaec8ae623ebf24
Malware family:
BlackWorm
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments