MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 8d2e5b3eae73c52b375808391efd19e668ce9b9d8d53b45e30f0a816ca21863b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RecordBreaker
Vendor detections: 12
| SHA256 hash: | 8d2e5b3eae73c52b375808391efd19e668ce9b9d8d53b45e30f0a816ca21863b |
|---|---|
| SHA3-384 hash: | 19e32c086cf2140ee3273b66fb929262136f3d9daeb2e2dcf65ab0eaa0c8b5a46d88d6b4ff43f321115746cfb144d02b |
| SHA1 hash: | 5d1045371555a49f9a19e16d0f7d84de51a2a8ed |
| MD5 hash: | 140f2b18b19516463ad87eeee428ec3c |
| humanhash: | william-fanta-mountain-cola |
| File name: | 140f2b18b19516463ad87eeee428ec3c.exe |
| Download: | download sample |
| Signature | RecordBreaker |
| File size: | 883'104 bytes |
| First seen: | 2022-08-28 21:46:25 UTC |
| Last seen: | 2022-08-28 22:34:33 UTC |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 48c28d9f3783f0e32815b0b4c57a60a9 (73 x RecordBreaker, 23 x RedLineStealer, 21 x ArkeiStealer) |
| ssdeep | 12288:jpB4giN48AAL6cEm2lfxUfjnoDJo3I4wjspZqAgWP6Jg45Ob6u+M3jzL:jpB4BN48/L6cEmyvjs7qPWPaobVL |
| Threatray | 258 similar samples on MalwareBazaar |
| TLSH | T13F159F213DC48172EEF220B646FCBA35427DE0B407254ACB56DA57EEC6246C17F3768A |
| TrID | 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 16.4% (.EXE) Win64 Executable (generic) (10523/12/4) 10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.0% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | exe recordbreaker |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://95.217.187.116/ | https://threatfox.abuse.ch/ioc/845914/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | RaccoonV2 |
|---|---|
| Author: | @_FirehaK <yara@firehak.com> |
| Description: | This rule detects Raccoon Stealer version 2.0 (called Recordbreaker before attribution). It has been spotted spreading through fake software cracks and keygens as far back as April 2022. |
| Reference: | https://www.zerofox.com/blog/brief-raccoon-stealer-version-2-0/ |
| Rule name: | win_recordbreaker_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.recordbreaker. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.