• Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Press Release
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Alert – Snake Keylogger’s Malware – Active IOCs
January 18, 2023
Rewterz Threat Alert – DarkSide Ransomware – Active IOCs
January 18, 2023

Rewterz Threat Alert – RecordBreaker Malware – Active IOCs

January 18, 2023

Severity

High

Analysis Summary

RecordBreaker is a type of malware that is designed to steal personal information from infected computers. This can include sensitive information such as login credentials, credit card numbers, and other financial data. RecordBreaker malware is the successor of Raccoon Stealer (also known as Raccoon Stealer 2.0), although it is a complete rewrite in C/C++. The malware is typically spread through phishing emails, malicious websites, or infected software downloads. Once installed on a computer, RecordBreaker can run in the background and collect information without the user’s knowledge. It can also open backdoors to allow hackers to remotely access the infected computer and steal information or install additional malware. To protect against RecordBreaker and other types of malware, it is important to use a reputable antivirus program and be cautious when clicking on links or downloading software from untrusted sources.

Impact

  • Data Exfiltration
  • Credential Theft
  • Financial Loss

Indicators of Compromise

MD5

  • c9f445ba47d43aba67caf6020c2390d3
  • 34d5e3b2e5a29d4eab3a93b3bd27038e
  • 831c6bfffa7515c76c9227fcafbb5b53
  • f7c2b6f1264ae863cbf21db819051437
  • 6bc417da871ff290315237d18ae76664

SHA-256

  • acc70eb94782931ab5f817a91b3c4cedf4c3077fb497a63e90a55e500da7676e
  • 4d59d088de40abcfd78f88d45009dbfdd14d9df76b718bc1c27241ec2807ef8d
  • c78a086f3cd67ac6d8de1ca706fe146d44fa3c46505ff95c7563c7d7d1948b33
  • 7f4b450947cbe4007402816a42e6281cd1f3d76ce090c547d5643d5b8f227d49
  • f0a1bb27f377fc0790acfc272e259d765c1220967b87b784e0e5141cbcaf950b

SHA-1

  • 03180d69fa4b26edbe627e2691df38882eab03b0
  • abc81a9f13f2d1272ff43b7e706de66c22a812f8
  • f74203c542c6e8e7ae81583528f48f6d1b043590
  • c6599df4d126fe8ab6e338dbedddfb063be56f51
  • eebb40025f1ba30d6065bd2a37038af1422b66d2

Remediation

  • Block all threat indicators at your respective controls.
  • Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
  • Ensure that general security policies are employed including: implementing strong passwords, correct configurations, and proper administration security policies.
  • Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
  • Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets
  • Never open links or attachments from unknown senders.
  • Services
    • Assess
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.