MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6ed7bcd055c39d73d9931abe8e3c72dd5eedc515abe2f804d6eafde208a69e71. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RecordBreaker


Vendor detections: 10


Intelligence 10 IOCs 4 YARA 2 File information Comments

SHA256 hash: 6ed7bcd055c39d73d9931abe8e3c72dd5eedc515abe2f804d6eafde208a69e71
SHA3-384 hash: 48331e404d0a29e914f5762cc4ff44a3a77374dc45a58fb04bb4fc5359c76fa5de8ee5385e69e8f69f4ee9a929923454
SHA1 hash: b28cee99d6873187cdb892bfd266fb881cba22e3
MD5 hash: e20882c3aba53d306804042cf1837fd5
humanhash: pasta-whiskey-summer-illinois
File name:e20882c3aba53d306804042cf1837fd5.exe
Download: download sample
Signature RecordBreaker
File size:973'216 bytes
First seen:2022-08-28 05:35:37 UTC
Last seen:2022-08-28 06:49:24 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 48c28d9f3783f0e32815b0b4c57a60a9 (73 x RecordBreaker, 23 x RedLineStealer, 21 x ArkeiStealer)
ssdeep 12288:g4l0OLIGFEG7UoEsrGC9elcnSK95+jRLXqcDAybe4SwbtVnnWhig8JN/1C19uluN:v0OQrsrGwxnSK95JsbtVWUgQC1f7s//6
TLSH T1B525AE2139D58532EDE3607642ECBA23062DF8F007294ACB5688D7EEC6386D17F36957
TrID 32.2% (.EXE) Win64 Executable (generic) (10523/12/4)
20.1% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
15.4% (.EXE) Win16 NE executable (generic) (5038/12/1)
13.7% (.EXE) Win32 Executable (generic) (4505/5/1)
6.2% (.EXE) OS/2 Executable (generic) (2029/13)
Reporter abuse_ch
Tags:exe recordbreaker


Avatar
abuse_ch
RecordBreaker C2:
51.79.245.217:12450

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
51.79.245.217:12450 https://threatfox.abuse.ch/ioc/845734/
http://inexu.top/ https://threatfox.abuse.ch/ioc/845736/
http://49.12.72.35/ https://threatfox.abuse.ch/ioc/845790/
http://45.153.186.205/wordpressJs/9/1AsyncExternalPacket/7/36pipe/MultiLowProtonwp/lineLocal/8base/protectProton/2Packet9/PipeProvider8linux/Db/JavascriptcpuupdateFlower/20public/5/Video/Templow/Eternaljavascriptjspublic.php https://threatfox.abuse.ch/ioc/845893/

Intelligence


File Origin
# of uploads :
2
# of downloads :
267
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
e20882c3aba53d306804042cf1837fd5.exe
Verdict:
No threats detected
Analysis date:
2022-08-28 05:36:40 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
CheckNumberOfProcessor
CheckCmdLine
EvasionQueryPerformanceCounter
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
greyware ilasm.exe mokes overlay packed
Result
Verdict:
SUSPICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
DCRat, Raccoon Stealer v2, RedLine, Smok
Detection:
malicious
Classification:
troj.adwa.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Drops PE files to the startup folder
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Performs DNS queries to domains with low reputation
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected DCRat
Yara detected Generic Downloader
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected SmokeLoader
Yara detected Vidar stealer
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 691665 Sample: Jz5nKJcxI8.exe Startdate: 28/08/2022 Architecture: WINDOWS Score: 100 88 ilabok2498fso.xyz 2->88 90 ip-api.com 2->90 112 Snort IDS alert for network traffic 2->112 114 Multi AV Scanner detection for domain / URL 2->114 116 Malicious sample detected (through community Yara rule) 2->116 118 14 other signatures 2->118 12 Jz5nKJcxI8.exe 2->12         started        14 gjhidhv 2->14         started        signatures3 process4 process5 16 AppLaunch.exe 12->16         started        19 WerFault.exe 23 9 12->19         started        22 conhost.exe 12->22         started        24 AppLaunch.exe 12->24         started        file6 104 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 16->104 106 Maps a DLL or memory area into another process 16->106 108 Checks if the current machine is a virtual machine (disk enumeration) 16->108 110 Creates a thread in another existing process (thread injection) 16->110 26 explorer.exe 16 16->26 injected 70 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 19->70 dropped signatures7 process8 dnsIp9 98 ilabok2498fso.xyz 26->98 100 ilab2478jdshd.xyz 26->100 102 9 other IPs or domains 26->102 72 C:\Users\user\AppData\Roaming\gjhidhv, PE32 26->72 dropped 74 C:\Users\user\AppData\Local\Temp\FB0B.exe, PE32 26->74 dropped 76 C:\Users\user\AppData\Local\Temp\D6B9.exe, PE32 26->76 dropped 78 5 other malicious files 26->78 dropped 126 System process connects to network (likely due to code injection or exploit) 26->126 128 Benign windows process drops PE files 26->128 130 Performs DNS queries to domains with low reputation 26->130 132 3 other signatures 26->132 31 651F.exe 26->31         started        34 FB0B.exe 26->34         started        37 AB24.exe 26->37         started        39 4 other processes 26->39 file10 signatures11 process12 file13 134 Contains functionality to inject code into remote processes 31->134 136 Writes to foreign memory regions 31->136 138 Allocates memory in foreign processes 31->138 41 AppLaunch.exe 17 31->41         started        45 WerFault.exe 31->45         started        66 C:\Users\user\AppData\Roaming\...\Product.exe, PE32 34->66 dropped 140 Machine Learning detection for dropped file 34->140 142 Drops PE files to the startup folder 34->142 144 Injects a PE file into a foreign processes 34->144 146 Multi AV Scanner detection for dropped file 37->146 48 conhost.exe 37->48         started        50 AppLaunch.exe 37->50         started        58 2 other processes 37->58 68 C:\Users\user\AppData\Local\...\Update.exe, PE32 39->68 dropped 52 AppLaunch.exe 39->52         started        54 Update.exe 7 39->54         started        56 AppLaunch.exe 2 39->56         started        60 2 other processes 39->60 signatures14 process15 dnsIp16 92 t.me 149.154.167.99, 443, 49769 TELEGRAMRU United Kingdom 41->92 94 49.12.72.35, 49772, 80 HETZNER-ASDE Germany 41->94 120 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 41->120 122 Tries to harvest and steal browser information (history, passwords, etc) 41->122 124 Tries to steal Crypto Currency Wallets 41->124 62 cmd.exe 41->62         started        80 C:\ProgramData\Microsoft\...\Report.wer, Little-endian 45->80 dropped 96 inexu.top 52->96 82 C:\Users\user\AppData\LocalLow\nss3.dll, PE32 52->82 dropped 84 C:\Users\user\AppData\LocalLow\msvcp140.dll, PE32 52->84 dropped 86 C:\Users\user\AppData\Local\...\Update.exe, PE32 54->86 dropped file17 signatures18 process19 process20 64 conhost.exe 62->64         started       
Threat name:
Win32.Spyware.RedLine
Status:
Malicious
First seen:
2022-08-28 05:36:09 UTC
File Type:
PE (Exe)
Extracted files:
1
AV detection:
20 of 26 (76.92%)
Threat level:
  2/5
Verdict:
malicious
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Unpacked files
SH256 hash:
412723a3d9295cf6e564e10c1e75642bdd82cbd161ffa9153562edb1a60be12d
MD5 hash:
30206da27efa9add6fc43c102e811b5d
SHA1 hash:
5b950f382a52bf91b5054565402a351b78d6b04f
Detections:
win_smokeloader_a2
Parent samples :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 hash:
6ed7bcd055c39d73d9931abe8e3c72dd5eedc515abe2f804d6eafde208a69e71
MD5 hash:
e20882c3aba53d306804042cf1837fd5
SHA1 hash:
b28cee99d6873187cdb892bfd266fb881cba22e3
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RecordBreaker

Executable exe 6ed7bcd055c39d73d9931abe8e3c72dd5eedc515abe2f804d6eafde208a69e71

(this sample)

  
Delivery method
Distributed via web download

Comments