MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 71976a8939fca900ea30249c75dc1f462bebf2d9bac2e9900679c59bf2ad00c8. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RecordBreaker


Vendor detections: 14


Intelligence 14 IOCs 2 YARA 9 File information Comments

SHA256 hash: 71976a8939fca900ea30249c75dc1f462bebf2d9bac2e9900679c59bf2ad00c8
SHA3-384 hash: 8dd48b935de8a7b4a2b650cf58e4596aabf0679f1f435bbccb465c50dd3e637213b4fd3be2d8c875043965967e260457
SHA1 hash: 4ab24c962cb923a0a36f2620241b40c8d4f609d3
MD5 hash: 4109b53059128d74bf178bfbc7b5d7e5
humanhash: jersey-montana-vegan-queen
File name:4109b53059128d74bf178bfbc7b5d7e5.exe
Download: download sample
Signature RecordBreaker
File size:4'976'640 bytes
First seen:2022-10-06 16:20:38 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash f9644890a52aa13e3e994733d15fcb99 (1 x RecordBreaker, 1 x TrickBot, 1 x Smoke Loader)
ssdeep 98304:9cbmnt2j4EbBdfXPJ2/46GalfFZIAQY4yHec/1F4:97cbBFXPQJGapIqoc/
Threatray 473 similar samples on MalwareBazaar
TLSH T1C436226325509345E5F9EC39CA377DD431FA0E699A82AC7864E9B9C32932CE5F303943
TrID 29.6% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
22.7% (.EXE) Win16 NE executable (generic) (5038/12/1)
20.3% (.EXE) Win32 Executable (generic) (4505/5/1)
9.1% (.EXE) OS/2 Executable (generic) (2029/13)
9.0% (.EXE) Generic Win/DOS Executable (2002/3)
File icon (PE):PE icon
dhash icon f0f0f8e8e8e4e071 (1 x RecordBreaker)
Reporter abuse_ch
Tags:exe recordbreaker


Avatar
abuse_ch
RecordBreaker C2:
http://89.185.85.175/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://89.185.85.175/ https://threatfox.abuse.ch/ioc/870567/
193.109.120.27:81 https://threatfox.abuse.ch/ioc/871924/

Intelligence


File Origin
# of uploads :
1
# of downloads :
264
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a file in the Windows subdirectories
Сreating synchronization primitives
Modifying a system file
DNS request
Replacing files
Launching a service
Launching a process
Sending a UDP request
Forced system process termination
Reading critical registry keys
Blocking the Windows Defender launch
Adding exclusions to Windows Defender
Result
Malware family:
n/a
Score:
  5/10
Tags:
n/a
Behaviour
MalwareBazaar
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
packed shell32.dll
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
RedLine stealer
Verdict:
Malicious
Result
Threat name:
PrivateLoader, RedLine, SmokeLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
Creates HTML files with .exe extension (expired dropper behavior)
Creates processes via WMI
Detected VMProtect packer
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Modifies Group Policy settings
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
PE file contains section with special chars
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected PrivateLoader
Yara detected RedLine Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 717656 Sample: w8Y08Ijggc.exe Startdate: 06/10/2022 Architecture: WINDOWS Score: 100 151 Malicious sample detected (through community Yara rule) 2->151 153 Antivirus detection for URL or domain 2->153 155 Antivirus detection for dropped file 2->155 157 15 other signatures 2->157 9 w8Y08Ijggc.exe 10 47 2->9         started        14 PowerControl_Svc.exe 2->14         started        16 PowerControl_Svc.exe 2->16         started        process3 dnsIp4 125 87.240.129.133 VKONTAKTE-SPB-AShttpvkcomRU Russian Federation 9->125 127 87.240.190.76 VKONTAKTE-SPB-AShttpvkcomRU Russian Federation 9->127 129 13 other IPs or domains 9->129 87 C:\Users\...\u7btJxk40K0F_EUxhI0bs8pO.exe, PE32 9->87 dropped 89 C:\Users\...\qvz1dYfALrrMTng9s5A7_2nh.exe, PE32 9->89 dropped 91 C:\Users\...\pXzl1NJpaMfwgT05wK0jVDdK.exe, PE32 9->91 dropped 101 16 other malicious files 9->101 dropped 171 Creates HTML files with .exe extension (expired dropper behavior) 9->171 173 Disables Windows Defender (deletes autostart) 9->173 175 Modifies Group Policy settings 9->175 177 Disable Windows Defender real time protection (registry) 9->177 18 UitCKGeysaNyFHXyeuLikIaa.exe 17 9->18         started        22 hnUB6jc1ZJgwOD6vYIeeR0HF.exe 2 9->22         started        24 XMBUgnHZix7ZubOXISuGPrpF.exe 9->24         started        27 9 other processes 9->27 93 C:\Users\...\TBKrqvOioddpgD2Y_CstUUDl.exe, PE32 14->93 dropped 95 C:\Users\user\AppData\Local\...\WW14[1].exe, PE32 14->95 dropped 97 C:\Users\...\8FjqLDQtY_bV5Q8JAVggznSI.exe, PE32 16->97 dropped 99 C:\Users\user\AppData\Local\...\WW14[2].exe, PE32 16->99 dropped file5 signatures6 process7 dnsIp8 115 149.154.167.99 TELEGRAMRU United Kingdom 18->115 117 163.123.143.4 ILIGHT-NETUS Reserved 18->117 71 C:\Users\...\lY0GyuRYp32lUEDQFn7nPEhv.exe, PE32 18->71 dropped 73 C:\Users\user\AppData\Local\...\WW14[1].exe, PE32 18->73 dropped 75 C:\...\PowerControl_Svc.exe, PE32 18->75 dropped 29 lY0GyuRYp32lUEDQFn7nPEhv.exe 18->29         started        34 schtasks.exe 18->34         started        36 schtasks.exe 18->36         started        77 C:\Users\user\AppData\Local\...\Install.exe, PE32 22->77 dropped 38 Install.exe 22->38         started        163 Writes to foreign memory regions 24->163 165 Allocates memory in foreign processes 24->165 167 Injects a PE file into a foreign processes 24->167 46 3 other processes 24->46 119 157.240.20.35 FACEBOOKUS United States 27->119 121 157.240.236.35 FACEBOOKUS United States 27->121 123 2 other IPs or domains 27->123 79 C:\Users\user\AppData\Local\...\SETUP_~1.EXE, PE32 27->79 dropped 81 C:\Users\user\AppData\Local\Temp\9ZSQ2h.cpl, PE32 27->81 dropped 83 C:\1.sfx.exe, PE32 27->83 dropped 169 Tries to harvest and steal browser information (history, passwords, etc) 27->169 40 SETUP_~1.EXE 27->40         started        42 qvz1dYfALrrMTng9s5A7_2nh.exe 27->42         started        44 chrome.exe 27->44         started        48 4 other processes 27->48 file9 signatures10 process11 dnsIp12 137 87.240.132.72 VKONTAKTE-SPB-AShttpvkcomRU Russian Federation 29->137 139 87.240.190.89 VKONTAKTE-SPB-AShttpvkcomRU Russian Federation 29->139 147 12 other IPs or domains 29->147 103 C:\Users\...\uYTZ8njYtee4yH_RODAsWgZa.exe, PE32 29->103 dropped 105 C:\Users\...\ivLCPEKRhWyaiT0lg3p3Cjn_.exe, PE32 29->105 dropped 107 C:\Users\...\fczHnEJfM5PfwNLuUvalvSMF.exe, PE32 29->107 dropped 113 26 other malicious files 29->113 dropped 179 Multi AV Scanner detection for dropped file 29->179 181 Tries to harvest and steal browser information (history, passwords, etc) 29->181 50 conhost.exe 34->50         started        52 conhost.exe 36->52         started        109 C:\Users\user\AppData\Local\...\Install.exe, PE32 38->109 dropped 54 Install.exe 38->54         started        141 108.179.193.18 UNIFIEDLAYER-AS-1US United States 40->141 143 188.114.97.3 CLOUDFLARENETUS European Union 42->143 111 C:\Users\user\AppData\Local\Temp\db.dll, PE32 42->111 dropped 58 conhost.exe 42->58         started        149 3 other IPs or domains 44->149 60 chrome.exe 44->60         started        63 chrome.exe 44->63         started        65 chrome.exe 44->65         started        145 52.168.117.173 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 46->145 67 rundll32.exe 48->67         started        file13 signatures14 process15 dnsIp16 85 C:\Users\user\AppData\Local\...\qGkbQRF.exe, PE32 54->85 dropped 159 Antivirus detection for dropped file 54->159 161 Multi AV Scanner detection for dropped file 54->161 69 Conhost.exe 54->69         started        131 142.250.184.206 GOOGLEUS United States 60->131 133 142.250.184.234 GOOGLEUS United States 60->133 135 19 other IPs or domains 60->135 file17 signatures18 process19
Threat name:
Win32.Backdoor.Zapchast
Status:
Malicious
First seen:
2022-10-01 21:09:17 UTC
File Type:
PE (Exe)
Extracted files:
4
AV detection:
24 of 26 (92.31%)
Threat level:
  5/5
Result
Malware family:
smokeloader
Score:
  10/10
Tags:
family:djvu family:nymaim family:privateloader family:redline family:smokeloader botnet:1 botnet:mun botnet:nam6.9 backdoor discovery infostealer loader main persistence ransomware spyware stealer trojan upx vmprotect
Behaviour
Creates scheduled task(s)
Enumerates processes with tasklist
Modifies registry class
Modifies system certificate store
Runs ping.exe
Script User-Agent
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Program crash
Drops file in System32 directory
Adds Run key to start application
Legitimate hosting services abused for malware hosting/C2
Looks up external IP address via web service
Checks computer location settings
Loads dropped DLL
Modifies file permissions
Reads user/profile data of web browsers
Unexpected DNS network traffic destination
Uses the VBS compiler for execution
Downloads MZ/PE file
Executes dropped EXE
UPX packed file
VMProtect packed file
Detected Djvu ransomware
Detects Smokeloader packer
Djvu Ransomware
NyMaim
PrivateLoader
Process spawned unexpected child process
RedLine
RedLine payload
SmokeLoader
Malware Config
C2 Extraction:
http://163.123.143.4/proxies.txt
http://107.182.129.251/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
163.123.143.12
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
103.89.90.61:34589
yaterirennin.xyz:80
ncoduryllixe.xyz:80
208.67.104.97
85.31.46.167
79.110.62.196:35726
http://winnlinne.com/lancer/get.php
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
7e6a8f7f68a8be5a9041491192fd3886f243b70e4d3e6afd01600ad532aee9f5
MD5 hash:
ed59f88bcc42b2a0f24e4206de3f7977
SHA1 hash:
6282b347acb97ddbc39e432e2636beb081a38e56
Detections:
win_privateloader_a0
SH256 hash:
71976a8939fca900ea30249c75dc1f462bebf2d9bac2e9900679c59bf2ad00c8
MD5 hash:
4109b53059128d74bf178bfbc7b5d7e5
SHA1 hash:
4ab24c962cb923a0a36f2620241b40c8d4f609d3
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CAS_Malware_Hunting
Author:Michael Reinprecht
Description:DEMO CAS YARA Rules for sample2.exe
Rule name:INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore
Author:ditekSHen
Description:Detects executables containing SQL queries to confidential data stores. Observed in infostealers
Rule name:MALWARE_Win_Chebka
Author:ditekSHen
Description:Detects Chebka
Rule name:MALWARE_Win_RedLine
Author:ditekSHen
Description:Detects RedLine infostealer
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:meth_stackstrings
Author:Willi Ballenthin
Rule name:pe_imphash
Rule name:Skystars_Malware_Imphash
Author:Skystars LightDefender
Description:imphash
Rule name:SUSP_XORed_MSDOS_Stub_Message
Author:Florian Roth
Description:Detects suspicious XORed MSDOS stub message
Reference:https://yara.readthedocs.io/en/latest/writingrules.html#xor-strings

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments