MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 9784234158283ec0b873fa2d3c5259fc92d99c9b84d9d96c1994b8777d11e04b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
RecordBreaker
Vendor detections: 15
| SHA256 hash: | 9784234158283ec0b873fa2d3c5259fc92d99c9b84d9d96c1994b8777d11e04b |
|---|---|
| SHA3-384 hash: | 0adf957043c5ff75cfc1e0e8aac0f89dd78c3b71b42ce7d08416dafbe6184f5e6d0f9f3466123f6407cb4fa318770c1f |
| SHA1 hash: | 33c1fea4dfba9a7da66107a552aae47b1801b6c6 |
| MD5 hash: | 7e6e096598dcc6cd1ff7f8038d724815 |
| humanhash: | zulu-sweet-one-maryland |
| File name: | 7e6e096598dcc6cd1ff7f8038d724815.exe |
| Download: | download sample |
| Signature | RecordBreaker |
| File size: | 244'712 bytes |
| First seen: | 2022-08-17 17:35:34 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 14ce7ca1f5460d1e391272f9c37619af (12 x RecordBreaker, 8 x RedLineStealer, 2 x Smoke Loader) |
| ssdeep | 6144:rpCbmgV0AIk0ZOEkYAOzby1lSF7awJlwO0zXbOqnSWhAnQc:rpmmgyxNby1lSRawJlwLza6S/Qc |
| TLSH | T1A9349E5074D28832C972183A46E0DA74593EF4F50F5259FF23A90FFE5F226C19531AEA |
| TrID | 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13) 16.4% (.EXE) Win64 Executable (generic) (10523/12/4) 10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2) 7.8% (.EXE) Win16 NE executable (generic) (5038/12/1) 7.0% (.EXE) Win32 Executable (generic) (4505/5/1) |
| Reporter | |
| Tags: | exe recordbreaker |
Indicators Of Compromise (IOCs)
Below is a list of indicators of compromise (IOCs) associated with this malware samples.
| IOC | ThreatFox Reference |
|---|---|
| http://85.192.63.46/ | https://threatfox.abuse.ch/ioc/843816/ |
Intelligence
File Origin
Vendor Threat Intelligence
Result
Behaviour
Result
Behaviour
Result
Details
Result
Signature
Behaviour
Result
Behaviour
Unpacked files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 Signatures
MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.
| Rule name: | cobalt_strike_tmp01925d3f |
|---|---|
| Author: | The DFIR Report |
| Description: | files - file ~tmp01925d3f.exe |
| Reference: | https://thedfirreport.com |
| Rule name: | pdb_YARAify |
|---|---|
| Author: | @wowabiy314 |
| Description: | PDB |
| Rule name: | RaccoonV2 |
|---|---|
| Author: | @_FirehaK <yara@firehak.com> |
| Description: | This rule detects Raccoon Stealer version 2.0 (called Recordbreaker before attribution). It has been spotted spreading through fake software cracks and keygens as far back as April 2022. |
| Reference: | https://www.zerofox.com/blog/brief-raccoon-stealer-version-2-0/ |
| Rule name: | win_recordbreaker_auto |
|---|---|
| Author: | Felix Bilstein - yara-signator at cocacoding dot com |
| Description: | Detects win.recordbreaker. |
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.