General

  • Target

    RobloxPlayerLauncher.exe

  • Size

    4.8MB

  • Sample

    230827-v4qvcacb52

  • MD5

    3d543894585b94e6aacf84393316d6ad

  • SHA1

    0c5f434dee448ee68934592041599a352eb4adc9

  • SHA256

    29d5d5af782442398d76e0347993c4c54dfbb72b726201d43fb87f63603f384b

  • SHA512

    ac33049a35be16928f4467507693bddec888273ad38f06ac35a086e5a4e1a01fa9a6186d05412ef685bbc7f46bbfed55815b5c5948938cc636e612f235a4dce1

  • SSDEEP

    98304:LqvQa+5F/FTJvBfCZSWxAqge4mjduCakK+lZkbYiF:i25jJ5CLge9Y+3klF

Malware Config

Targets

    • Target

      RobloxPlayerLauncher.exe

    • Size

      4.8MB

    • MD5

      3d543894585b94e6aacf84393316d6ad

    • SHA1

      0c5f434dee448ee68934592041599a352eb4adc9

    • SHA256

      29d5d5af782442398d76e0347993c4c54dfbb72b726201d43fb87f63603f384b

    • SHA512

      ac33049a35be16928f4467507693bddec888273ad38f06ac35a086e5a4e1a01fa9a6186d05412ef685bbc7f46bbfed55815b5c5948938cc636e612f235a4dce1

    • SSDEEP

      98304:LqvQa+5F/FTJvBfCZSWxAqge4mjduCakK+lZkbYiF:i25jJ5CLge9Y+3klF

    • Downloads MZ/PE file

    • Sets file execution options in registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

MITRE ATT&CK Enterprise v15

Tasks