General
-
Target
https://github.com/Pr3tor1an/-Ro3b-botnet/blob/main/Ro3b-botnet.exe
-
Sample
221221-qae4jacc83
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Pr3tor1an/-Ro3b-botnet/blob/main/Ro3b-botnet.exe
Resource
win7-20220812-en
windows7-x64
15 signatures
150 seconds
Behavioral task
behavioral2
Sample
https://github.com/Pr3tor1an/-Ro3b-botnet/blob/main/Ro3b-botnet.exe
Resource
win10v2004-20221111-en
windows10-2004-x64
13 signatures
150 seconds
Malware Config
Extracted
Family
lucastealer
C2
https://api.telegram.org/bot5659694192:AAFm4m__O5QDGizUpDxK2Q7lvAvGuN2DoOc
Targets
-
-
Target
https://github.com/Pr3tor1an/-Ro3b-botnet/blob/main/Ro3b-botnet.exe
Score10/10-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-