MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 edf6e2af884cf11eee6a8639a5cd594c32537063cf4c984bbd190d51d182c59c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



RecordBreaker


Vendor detections: 11


Intelligence 11 IOCs YARA 3 File information Comments

SHA256 hash: edf6e2af884cf11eee6a8639a5cd594c32537063cf4c984bbd190d51d182c59c
SHA3-384 hash: 27ef2dabbbbd6c5404d6c96f81ba380cf386f6336924dc0119d9d5e04864d00382bef238923073c635de6252b8a7005b
SHA1 hash: 409b7cf4a82bed77da422dc1a4aee725d573e71c
MD5 hash: d9575dc688656c724994d049913574f7
humanhash: louisiana-fish-carpet-west
File name:SecuriteInfo.com.Variant.Fragtor.132154.8286.5908
Download: download sample
Signature RecordBreaker
File size:110'080 bytes
First seen:2022-08-22 05:28:52 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 1e30af043142429ccc5d7bc35b017d9f (13 x RedLineStealer, 10 x RecordBreaker, 1 x Smoke Loader)
ssdeep 3072:DePyelJjCUDFu++bAp8p+Cdsv1pVH+VTDeL/caqOlr1h2srbH:DOjy++hwVqTDeL/dtr1hrrbH
Threatray 9'939 similar samples on MalwareBazaar
TLSH T11EB39D03BAD29471EC761D3658709AA19B3FF8100B69DEEB2788467D0F305C19D29E7B
TrID 48.8% (.EXE) Win32 Executable MS Visual C++ (generic) (31206/45/13)
16.4% (.EXE) Win64 Executable (generic) (10523/12/4)
10.2% (.DLL) Win32 Dynamic Link Library (generic) (6578/25/2)
7.8% (.EXE) Win16 NE executable (generic) (5038/12/1)
7.0% (.EXE) Win32 Executable (generic) (4505/5/1)
Reporter SecuriteInfoCom
Tags:exe recordbreaker

Intelligence


File Origin
# of uploads :
1
# of downloads :
294
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
SecuriteInfo.com.Variant.Fragtor.132154.8286.5908
Verdict:
No threats detected
Analysis date:
2022-08-22 05:29:27 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Result
Malware family:
n/a
Score:
  7/10
Tags:
n/a
Behaviour
MalwareBazaar
MeasuringTime
CheckNumberOfProcessor
EvasionQueryPerformanceCounter
CheckCmdLine
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
anti-vm greyware keylogger packed
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Raccoon Stealer v2, RedLine, SmokeLoader
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Antivirus detection for URL or domain
Benign windows process drops PE files
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Drops PE files with a suspicious file extension
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Obfuscated command line found
System process connects to network (likely due to code injection or exploit)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Writes to foreign memory regions
Yara detected Generic Downloader
Yara detected Raccoon Stealer v2
Yara detected RedLine Stealer
Yara detected SmokeLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 687811 Sample: SecuriteInfo.com.Variant.Fr... Startdate: 22/08/2022 Architecture: WINDOWS Score: 100 85 in.appcenter.ms 2->85 87 coinsurf.com 2->87 109 Malicious sample detected (through community Yara rule) 2->109 111 Antivirus detection for URL or domain 2->111 113 Multi AV Scanner detection for submitted file 2->113 115 8 other signatures 2->115 12 SecuriteInfo.com.Variant.Fragtor.132154.8286.exe 1 2->12         started        15 wfiffru 2 2->15         started        signatures3 process4 signatures5 137 Contains functionality to inject code into remote processes 12->137 139 Writes to foreign memory regions 12->139 141 Allocates memory in foreign processes 12->141 143 Injects a PE file into a foreign processes 12->143 17 MSBuild.exe 12->17         started        20 conhost.exe 12->20         started        22 conhost.exe 15->22         started        process6 signatures7 101 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 17->101 103 Maps a DLL or memory area into another process 17->103 105 Checks if the current machine is a virtual machine (disk enumeration) 17->105 107 Creates a thread in another existing process (thread injection) 17->107 24 explorer.exe 8 17->24 injected process8 dnsIp9 89 185.215.113.58, 49720, 49723, 49726 WHOLESALECONNECTIONSNL Portugal 24->89 91 exppressvpn.org 185.137.235.119, 443, 49725 SELECTELRU Russian Federation 24->91 93 2 other IPs or domains 24->93 77 C:\Users\user\AppData\Roaming\wfiffru, PE32 24->77 dropped 79 C:\Users\user\AppData\Local\Temp\D502.exe, PE32 24->79 dropped 81 C:\Users\user\AppData\Local\Temp\C7D2.exe, PE32 24->81 dropped 83 C:\Users\user\AppData\Local\Temp\A516.exe, PE32 24->83 dropped 129 System process connects to network (likely due to code injection or exploit) 24->129 131 Benign windows process drops PE files 24->131 133 Injects code into the Windows Explorer (explorer.exe) 24->133 135 2 other signatures 24->135 29 D502.exe 5 24->29         started        32 C7D2.exe 1 24->32         started        34 A516.exe 4 24->34         started        37 9 other processes 24->37 file10 signatures11 process12 file13 145 Multi AV Scanner detection for dropped file 29->145 147 Machine Learning detection for dropped file 29->147 39 cmd.exe 29->39         started        42 WerFault.exe 29->42         started        149 Writes to foreign memory regions 32->149 151 Allocates memory in foreign processes 32->151 153 Injects a PE file into a foreign processes 32->153 44 MSBuild.exe 2 32->44         started        46 WerFault.exe 3 10 32->46         started        48 conhost.exe 32->48         started        71 C:\Users\user\AppData\Local\...\Update.exe, PE32 34->71 dropped 50 Update.exe 7 34->50         started        signatures14 process15 file16 121 Obfuscated command line found 39->121 123 Uses ping.exe to sleep 39->123 125 Drops PE files with a suspicious file extension 39->125 127 Uses ping.exe to check the status of other devices and networks 39->127 53 cmd.exe 39->53         started        57 conhost.exe 39->57         started        59 PING.EXE 39->59         started        73 C:\Users\user\AppData\Local\...\Update.exe, PE32 50->73 dropped signatures17 process18 file19 75 C:\Users\user\AppData\...bbene.exe.pif, PE32 53->75 dropped 117 Obfuscated command line found 53->117 119 Uses ping.exe to sleep 53->119 61 Ebbene.exe.pif 53->61         started        65 tasklist.exe 53->65         started        67 find.exe 53->67         started        69 2 other processes 53->69 signatures20 process21 dnsIp22 95 jOuFDIswyTKUHhhn.jOuFDIswyTKUHhhn 61->95 97 iplogger.org 148.251.234.83, 443, 49729 HETZNER-ASDE Germany 61->97 99 www.google.com 142.251.209.4, 49730, 80 GOOGLEUS United States 61->99 155 May check the online IP address of the machine 61->155 signatures23
Threat name:
Win32.Trojan.Lazy
Status:
Malicious
First seen:
2022-08-22 03:25:00 UTC
File Type:
PE (Exe)
AV detection:
16 of 26 (61.54%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Unpacked files
SH256 hash:
edf6e2af884cf11eee6a8639a5cd594c32537063cf4c984bbd190d51d182c59c
MD5 hash:
d9575dc688656c724994d049913574f7
SHA1 hash:
409b7cf4a82bed77da422dc1a4aee725d573e71c
Malware family:
SmokeLoader
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CAS_Malware_Hunting
Author:Michael Reinprecht
Description:DEMO CAS YARA Rules for sample2.exe
Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

RecordBreaker

Executable exe edf6e2af884cf11eee6a8639a5cd594c32537063cf4c984bbd190d51d182c59c

(this sample)

  
Delivery method
Distributed via web download

Comments