MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 828979d543912cebcdfbc73bb80fb2744a8a2cb9a289915ec02df4b11c966338. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RecordBreaker


Vendor detections: 14


Intelligence 14 IOCs 1 YARA File information Comments

SHA256 hash: 828979d543912cebcdfbc73bb80fb2744a8a2cb9a289915ec02df4b11c966338
SHA3-384 hash: 78064b9c309d4348cd02109adda460462f7502f52a18d5f2b0e2cb2c35ddad56ffc079a732b6bcb0da4b2ddd03fd9a44
SHA1 hash: d82d2fd75bc092872e884634e5403f5d72697152
MD5 hash: 009013ee565051be2de777ca53ca6863
humanhash: potato-robin-pluto-lima
File name:009013ee565051be2de777ca53ca6863.exe
Download: download sample
Signature RecordBreaker
File size:1'140'224 bytes
First seen:2022-08-28 04:06:16 UTC
Last seen:2022-08-28 04:37:15 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 1e33718404ffbe0d91b536c10bf053f8 (80 x RedLineStealer, 7 x RecordBreaker, 4 x N-W0rm)
ssdeep 24576:4LWIV2qlhYiY724fAdbgMQPd8bYY/wvzyvreDAAL:4KvqmF58wvzy5A
Threatray 837 similar samples on MalwareBazaar
TLSH T11C354C29EB4715B4DA635371C19EEA7B9B147A348022AE3FFF4BDA0CB4331163C85256
TrID 44.6% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
23.6% (.EXE) Microsoft Visual C++ compiled executable (generic) (16529/12/5)
9.4% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.2% (.EXE) Win16 NE executable (generic) (5038/12/1)
6.4% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter abuse_ch
Tags:exe recordbreaker


Avatar
abuse_ch
RecordBreaker C2:
http://213.252.244.230/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://213.252.244.230/ https://threatfox.abuse.ch/ioc/845895/

Intelligence


File Origin
# of uploads :
2
# of downloads :
325
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
raccoon
ID:
1
File name:
https://mega.nz/file/QCtFnbLQ#ZURhhqQ92atwIHR6urN5YENDMqn0EPBpvvelxNsb7Cg
Verdict:
Malicious activity
Analysis date:
2022-08-25 19:13:06 UTC
Tags:
loader trojan raccoon recordbreaker stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
MeasuringTime
EvasionQueryPerformanceCounter
EvasionGetTickCount
Verdict:
No Threat
Threat level:
  2/10
Confidence:
100%
Tags:
anti-debug packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon Stealer v2
Detection:
malicious
Classification:
troj.evad
Score:
76 / 100
Signature
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Writes to foreign memory regions
Yara detected Raccoon Stealer v2
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.RedLine
Status:
Malicious
First seen:
2022-08-25 18:10:00 UTC
File Type:
PE (Exe)
AV detection:
29 of 40 (72.50%)
Threat level:
  5/5
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:4c319cb108b8c325bc279b0d33bd04f4 stealer
Behaviour
Suspicious use of WriteProcessMemory
Program crash
Suspicious use of SetThreadContext
Raccoon
Malware Config
C2 Extraction:
http://213.252.244.230/
Unpacked files
SH256 hash:
d72b2ffcc7028c0f9dd8d7c995decef511bf126a3b91874b8169b5586824a963
MD5 hash:
3cb09621c91e41ebf15ab6a57cfe9e59
SHA1 hash:
69bdba59efa3beaa5e93cc90153b93d62849536f
Detections:
win_recordbreaker_auto
SH256 hash:
828979d543912cebcdfbc73bb80fb2744a8a2cb9a289915ec02df4b11c966338
MD5 hash:
009013ee565051be2de777ca53ca6863
SHA1 hash:
d82d2fd75bc092872e884634e5403f5d72697152
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments