MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 bd963743ed3ccb3c8c05084a4f12f5d93d57d7fedfe39950826fd5e14fc14c9c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RecordBreaker


Vendor detections: 14


Intelligence 14 IOCs 1 YARA 2 File information Comments

SHA256 hash: bd963743ed3ccb3c8c05084a4f12f5d93d57d7fedfe39950826fd5e14fc14c9c
SHA3-384 hash: 547749d9502e27b8da412c5c513fa9c7dfcab1282396828a4f23d93774324ff54defb8ac5068a5e41b61b8597f1bc2cd
SHA1 hash: 0ac0dfccf1655eabda813cdf6a5c1c6c4fb38072
MD5 hash: a43af6d1cb409f84bef92a85ee9620e7
humanhash: lima-robert-queen-may
File name:a43af6d1cb409f84bef92a85ee9620e7.exe
Download: download sample
Signature RecordBreaker
File size:1'566'112 bytes
First seen:2022-09-26 12:25:56 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e60db7d95faa1cf274e4f66667784980 (1 x RecordBreaker, 1 x RedLineStealer)
ssdeep 24576:Wro48zqda2i7X6yTHLa9IQrkoDrdys5xyKdBVUGvZxBBmaj2Mgh5BriyzxvufI:Wrf8Og2i+y7muEkoD55oD+mJMg7BufI
TLSH T115751282C330083DE95B213CA2D0B651EEB5A9295D4B0AC35F0987735F7EBFB896518D
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
File icon (PE):PE icon
dhash icon 61e4cce8e8cce461 (1 x RecordBreaker, 1 x LaplasClipper)
Reporter abuse_ch
Tags:exe recordbreaker signed

Code Signing Certificate

Organisation:sunshine.com
Issuer:R3
Algorithm:sha256WithRSAEncryption
Valid from:2022-08-11T17:17:25Z
Valid to:2022-11-09T17:17:24Z
Serial number: 032660ee1d49ad35086027473e2614e5e724
Thumbprint Algorithm:SHA256
Thumbprint: a1ddae383b9e5cd580d521083691f8a91f147e858717605ae4beec343f0c9df2
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
abuse_ch
RecordBreaker C2:
http://176.124.216.15/

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
http://176.124.216.15/ https://threatfox.abuse.ch/ioc/851752/

Intelligence


File Origin
# of uploads :
1
# of downloads :
262
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Searching for the window
Launching a process
Сreating synchronization primitives
Unauthorized injection to a system process
Result
Malware family:
n/a
Score:
  9/10
Tags:
n/a
Behaviour
MalwareBazaar
SystemUptime
CPUID_Instruction
MeasuringTime
EvasionQueryPerformanceCounter
CheckCmdLine
EvasionGetTickCount
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
80%
Tags:
greyware overlay packed raccoonstealer
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon Stealer v2
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
DLL side loading technique detected
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
Yara detected Raccoon Stealer v2
Behaviour
Behavior Graph:
Threat name:
Win32.Spyware.Raccoonstealer
Status:
Malicious
First seen:
2022-09-21 17:11:36 UTC
File Type:
PE (Exe)
Extracted files:
12
AV detection:
32 of 41 (78.05%)
Threat level:
  2/5
Verdict:
malicious
Label(s):
raccoon
Result
Malware family:
raccoon
Score:
  10/10
Tags:
family:raccoon botnet:e59a41e858dd12c99932ed8038f0f6a1 spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of SetThreadContext
Accesses cryptocurrency files/wallets, possible credential harvesting
Loads dropped DLL
Downloads MZ/PE file
Raccoon
Malware Config
C2 Extraction:
http://176.124.216.15/
Verdict:
Suspicious
Tags:
n/a
YARA:
n/a
Unpacked files
SH256 hash:
56b2b9bdd5a6c6824da75ede20443983192741893c90e32fd034443f488ddfaa
MD5 hash:
c266ddb9fb8aee1e94b26ef0f7724f64
SHA1 hash:
18fc61f81f4ddb95f13c211a7ffcc8eb47d8772a
Detections:
raccoonstealer win_recordbreaker_auto
SH256 hash:
69766f5287bed93fb2638a780f25690d70060e20480c3e6af08ad3990db895ae
MD5 hash:
ffb2ed0d343644f717141c5706b15e4a
SHA1 hash:
a492a39c016b2c05be4a50964c7b9565396a51b1
SH256 hash:
bd963743ed3ccb3c8c05084a4f12f5d93d57d7fedfe39950826fd5e14fc14c9c
MD5 hash:
a43af6d1cb409f84bef92a85ee9620e7
SHA1 hash:
0ac0dfccf1655eabda813cdf6a5c1c6c4fb38072
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:RansomwareTest6
Author:Daoyuan Wu
Description:Test Ransomware YARA rules
Rule name:RansomwareTest7
Author:Daoyuan Wu
Description:Test Ransomware YARA rules

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments