General
-
Target
Multiple_ROBLOX.exe
-
Size
764KB
-
Sample
230211-zse1xshe3y
-
MD5
aed655395747a6602479f6032d3c099f
-
SHA1
5fcbd5735ed0e4a013667652f4c1382abb45203a
-
SHA256
3d6123dc6ffbd1a11d73229988203052809bd17617b24a034c1122c8f4983db4
-
SHA512
1a3db9e195e9e504a0a6c24557f1e141f90a73a89a853b8ad3ab2248d8e3fd97ba1ae78b93ad33005590ef0a44c5237e608b66a9c9fffde39e4730c226d91637
-
SSDEEP
6144:PIUUUFEiCVrw4RVJsp0oFP+dkM+i1g0UhCVrw4RuJsp0oFP+dkM+i1g0U:PB3gWCEBg5CE
Static task
static1
Behavioral task
behavioral1
Sample
Multiple_ROBLOX.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
Multiple_ROBLOX.exe
-
Size
764KB
-
MD5
aed655395747a6602479f6032d3c099f
-
SHA1
5fcbd5735ed0e4a013667652f4c1382abb45203a
-
SHA256
3d6123dc6ffbd1a11d73229988203052809bd17617b24a034c1122c8f4983db4
-
SHA512
1a3db9e195e9e504a0a6c24557f1e141f90a73a89a853b8ad3ab2248d8e3fd97ba1ae78b93ad33005590ef0a44c5237e608b66a9c9fffde39e4730c226d91637
-
SSDEEP
6144:PIUUUFEiCVrw4RVJsp0oFP+dkM+i1g0UhCVrw4RuJsp0oFP+dkM+i1g0U:PB3gWCEBg5CE
Score8/10-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-