

Rewterz Threat Alert – Gh0st RAT – Active IOCs
March 13, 2024
Rewterz Threat Advisory – Multiple Adobe Products Vulnerabilities
March 13, 2024
Rewterz Threat Alert – Gh0st RAT – Active IOCs
March 13, 2024
Rewterz Threat Advisory – Multiple Adobe Products Vulnerabilities
March 13, 2024Severity
High
Analysis Summary
RecordBreaker is a type of malware that is designed to steal personal information from infected computers. This can include sensitive information such as login credentials, credit card numbers, and other financial data. RecordBreaker malware is the successor of Raccoon Stealer (also known as Raccoon Stealer 2.0), although it is a complete rewrite in C/C++. The malware is typically spread through phishing emails, malicious websites, or infected software downloads. Once installed on a computer, RecordBreaker can run in the background and collect information without the user’s knowledge. It can also open backdoors to allow hackers to remotely access the infected computer and steal information or install additional malware. To protect against RecordBreaker and other types of malware, it is important to use a reputable antivirus program and be cautious when clicking on links or downloading software from untrusted sources.
Impact
- Data Exfiltration
- Credential Theft
- Financial Loss
Indicators of Compromise
MD5
- ad27c002c314717f78cadab27bf049cf
- 2856a877de2db673a2bba91be84fcf4d
- 1a4b749d66f83dd6fbc8f96b90cfd4f5
- d2d589d4600dcded8b770e84cf64b1bd
- f4d52951fc8094515a9e103892247e8e
- 300628edef4ec58b4caaf0c9b5c4f9ec
SHA-256
- ceb6b3d9b2ae0430495caaecedbdd494ff5cd44cb24780cbbb2863efa9386182
- 2a895eed42d2900a9f8d4cfc29383c5137b142c791f6873b0118c633f23ef6a5
- 90dea8f22e9858f2e345f3c499b5ef9c28c161eff15ec7c3cc75e74d0ee1fa89
- 8c47d27a1595e728278ae9c5842d69b3624d990e7cfea35dbdb9c5950839453b
- 8ac262e42dc9b061481f38467e202f22271f204cf595b610eb0ad4f5bbcd560b
- 257b63299846960e1521a62f6ff7e4422f26955785fd9758284591572e47056a
SHA-1
- 8467513920df45cc742760f05fef909b54a95261
- 64c90211ec0e306e43928afb8343407bca115a20
- 6b3781ad094b2833df6f534e25ed7b929828366f
- 33ce3a13017928086916b3b0131e693a10b5d9f1
- 5e7ac04c02e77a06412c6f46e1266d74543a2e20
- 53d450f38718165b17fe7baed43572c65030345c
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Ensure that general security policies are employed including implementing strong passwords, correct configurations, and proper administration security policies.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.
- Never open links or attachments from unknown senders.