Resubmissions

30/05/2024, 16:36

240530-t4p3daeb4t 1

06/02/2024, 18:10

240206-wr6kpscfd7 1

31/05/2023, 19:56

230531-ynyf2abb9x 6

31/05/2023, 19:50

230531-ykgzwaag44 6

31/05/2023, 19:46

230531-yg5a1aag25 6

30/05/2023, 17:06

230530-vml5tsag97 8

25/05/2023, 20:39

230525-zflb6sda3y 1

10/05/2023, 18:45

230510-xea4psbe4t 1

10/05/2023, 17:14

230510-vr8jmaba91 6

General

  • Target

    http://roblox.com

  • Sample

    230530-vml5tsag97

Malware Config

Targets

    • Target

      http://roblox.com

    • Downloads MZ/PE file

    • Modifies Installed Components in the registry

    • Sets file execution options in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops Chrome extension

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks