General

  • Target

    RobloxStudioLauncherBeta.exe

  • Size

    4.8MB

  • Sample

    230930-nj2msacc98

  • MD5

    fdb04b4dd596699ea1b87af827b24f57

  • SHA1

    f2f8c1f94677f283018b155cb610bad2cf92d7f5

  • SHA256

    a6d5cb5d9bea3e2f83867de4aae16eca270e2e50c4a78ff341762d06f4125298

  • SHA512

    05daa8b99e2ad2f3e5c1f0d85786187c7115bee5cf28772c3daa73559b3294a9f9202f3ed1f17afc6c0fad88f3ecbd9a32567c4578dc856397ffb10e11c712a5

  • SSDEEP

    98304:KBvq54FqGwzhex8xkmH6Vgk4ZoNvXo/Bkhor1QNYJbhh/XXy7:AY4FqlzS88gATSQyJ/i

Malware Config

Targets

    • Target

      RobloxStudioLauncherBeta.exe

    • Size

      4.8MB

    • MD5

      fdb04b4dd596699ea1b87af827b24f57

    • SHA1

      f2f8c1f94677f283018b155cb610bad2cf92d7f5

    • SHA256

      a6d5cb5d9bea3e2f83867de4aae16eca270e2e50c4a78ff341762d06f4125298

    • SHA512

      05daa8b99e2ad2f3e5c1f0d85786187c7115bee5cf28772c3daa73559b3294a9f9202f3ed1f17afc6c0fad88f3ecbd9a32567c4578dc856397ffb10e11c712a5

    • SSDEEP

      98304:KBvq54FqGwzhex8xkmH6Vgk4ZoNvXo/Bkhor1QNYJbhh/XXy7:AY4FqlzS88gATSQyJ/i

    • Downloads MZ/PE file

    • Sets file execution options in registry

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks