General
-
Target
RobloxPlayerLauncher.exe
-
Size
1.4MB
-
Sample
230214-cvhs9she4z
-
MD5
efcc36872a755c991df0fc66e46aec78
-
SHA1
c3910529ff97357f21bd9beb7a756a4d9f4cbbe6
-
SHA256
e545d921c10e47438a19ddbfc28409aac774973ed64a193a970f0b100f68d93b
-
SHA512
9653d16ef91e7a1310aff02307b5410a0a94442e06c964d8b974ae183aed751a4fafeceec7393400894c0a3be5dce9322619516d1a1f94728af2457b1b0aa0d6
-
SSDEEP
24576:LcI7W/ntSBq839pPM6l5uMSeR8UEu5B+17wUwTnJl+BMDXPdV:LcI7W/ntSBq839pPM6l5uMS45MaUwTnx
Static task
static1
Malware Config
Targets
-
-
Target
RobloxPlayerLauncher.exe
-
Size
1.4MB
-
MD5
efcc36872a755c991df0fc66e46aec78
-
SHA1
c3910529ff97357f21bd9beb7a756a4d9f4cbbe6
-
SHA256
e545d921c10e47438a19ddbfc28409aac774973ed64a193a970f0b100f68d93b
-
SHA512
9653d16ef91e7a1310aff02307b5410a0a94442e06c964d8b974ae183aed751a4fafeceec7393400894c0a3be5dce9322619516d1a1f94728af2457b1b0aa0d6
-
SSDEEP
24576:LcI7W/ntSBq839pPM6l5uMSeR8UEu5B+17wUwTnJl+BMDXPdV:LcI7W/ntSBq839pPM6l5uMS45MaUwTnx
-
Modifies system executable filetype association
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-