General

  • Target

    Roblox Imagination.exe

  • Size

    14.9MB

  • Sample

    231012-eyrxfsge65

  • MD5

    3f43df3838ddcc81e8e5857792ad3766

  • SHA1

    960fbad52f95d15bc165c566209575d43c048c48

  • SHA256

    45a98498ec64c1209bed4d01207a0a2909ef4ec531d9729ef95244770b8aad50

  • SHA512

    12f17532d9a79fccc5ae36f3e888c9c0dd6ff03d224d890ad55d64eea47890310b699b47d57f12325e710c32d704bc4f5441d78ffec0c703556d2a5d750c5610

  • SSDEEP

    393216:zYu7L/1/QCdQuslSq9RoWOv+9fgfP5R0ApkV/ue:zYCLt/QCdQuSborvSYv0FV

Malware Config

Targets

    • Target

      Roblox Imagination.exe

    • Size

      14.9MB

    • MD5

      3f43df3838ddcc81e8e5857792ad3766

    • SHA1

      960fbad52f95d15bc165c566209575d43c048c48

    • SHA256

      45a98498ec64c1209bed4d01207a0a2909ef4ec531d9729ef95244770b8aad50

    • SHA512

      12f17532d9a79fccc5ae36f3e888c9c0dd6ff03d224d890ad55d64eea47890310b699b47d57f12325e710c32d704bc4f5441d78ffec0c703556d2a5d750c5610

    • SSDEEP

      393216:zYu7L/1/QCdQuslSq9RoWOv+9fgfP5R0ApkV/ue:zYCLt/QCdQuSborvSYv0FV

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks