General

  • Target

    Roblox.Account.Manager.3.4.1.zip

  • Size

    2.9MB

  • Sample

    230111-3fr2haef69

  • MD5

    96015a88f2c9777cc26223e5686f7f45

  • SHA1

    4516d4fd033acce88e8907a1f718ae6e4dfcaa14

  • SHA256

    507eb4e5ced547daba6f2bfeb750ce91e528d965f6060fd209cbcdb1654f9780

  • SHA512

    5b52fa1b753aa3e270e8fcdc3e6e52212b28e1cfe56a248e11e91c9280792ad60297ccca3b45e17078ad5103f5b8255d9a8799bd6e4802b3b4b0477563d75701

  • SSDEEP

    49152:dHJmgruGEgwmKOV/nLykJO1rm6JJwV6LvU2bSkemJdsocG1nhZNH:1Jm8ZVrX/OkJORdWEfJqot1nh3H

Score
10/10

Malware Config

Targets

    • Target

      Roblox Account Manager/RBX Alt Manager.exe

    • Size

      3.8MB

    • MD5

      3088950d8671e650f0feba02fba8a9e0

    • SHA1

      920ddfb2ceeb97dee4b4a1650c717a83c02e9d9b

    • SHA256

      fe259ff7425d276f317072153ec9f5b87eede298643578b84428c402a162502f

    • SHA512

      9cd9ce262821a8d074ca5153e7334bccc8a5475d6a062830897d167344af71215885b215ef9f0d4275f2ffdbd97451f9519d292fa0cd57a7d737f09d4ea41b54

    • SSDEEP

      98304:cV2bT1QqxBpJzyaqUOJp0IyjI7W0FWUc:c+QqxBOlUOJp0tk7bWU

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks