General

  • Target

    rbxfpsunlocker_MS.exe

  • Size

    16.5MB

  • Sample

    230615-eekn2aee56

  • MD5

    b9c1bf922dad24ab74a82431dac10f42

  • SHA1

    0f0ead5c97a52a72c8c0eecb56cde46e3a34cbe4

  • SHA256

    7353e3e16cdb6517e4c40371ec89d676e9647db477815cd82f12c666bed9bb6f

  • SHA512

    f694f9e911e6aedc1508cf7fcd2971d982b15a1db68f867ca68fba3c3d741ab1190c4c245796e37a7f090d8ba9cee5d05aae8e96a926de38857b8e77d79e14c2

  • SSDEEP

    393216:6AIFkLFcQWXGznVPmpFqyYgsST02uEiD:9dFcQJnVPmW98fud

Malware Config

Targets

    • Target

      rbxfpsunlocker_MS.exe

    • Size

      16.5MB

    • MD5

      b9c1bf922dad24ab74a82431dac10f42

    • SHA1

      0f0ead5c97a52a72c8c0eecb56cde46e3a34cbe4

    • SHA256

      7353e3e16cdb6517e4c40371ec89d676e9647db477815cd82f12c666bed9bb6f

    • SHA512

      f694f9e911e6aedc1508cf7fcd2971d982b15a1db68f867ca68fba3c3d741ab1190c4c245796e37a7f090d8ba9cee5d05aae8e96a926de38857b8e77d79e14c2

    • SSDEEP

      393216:6AIFkLFcQWXGznVPmpFqyYgsST02uEiD:9dFcQJnVPmW98fud

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks