General
-
Target
Roblox Imagination.exe
-
Size
14.9MB
-
Sample
231012-eyrxfsge65
-
MD5
3f43df3838ddcc81e8e5857792ad3766
-
SHA1
960fbad52f95d15bc165c566209575d43c048c48
-
SHA256
45a98498ec64c1209bed4d01207a0a2909ef4ec531d9729ef95244770b8aad50
-
SHA512
12f17532d9a79fccc5ae36f3e888c9c0dd6ff03d224d890ad55d64eea47890310b699b47d57f12325e710c32d704bc4f5441d78ffec0c703556d2a5d750c5610
-
SSDEEP
393216:zYu7L/1/QCdQuslSq9RoWOv+9fgfP5R0ApkV/ue:zYCLt/QCdQuSborvSYv0FV
Behavioral task
behavioral1
Sample
Roblox Imagination.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
Roblox Imagination.exe
-
Size
14.9MB
-
MD5
3f43df3838ddcc81e8e5857792ad3766
-
SHA1
960fbad52f95d15bc165c566209575d43c048c48
-
SHA256
45a98498ec64c1209bed4d01207a0a2909ef4ec531d9729ef95244770b8aad50
-
SHA512
12f17532d9a79fccc5ae36f3e888c9c0dd6ff03d224d890ad55d64eea47890310b699b47d57f12325e710c32d704bc4f5441d78ffec0c703556d2a5d750c5610
-
SSDEEP
393216:zYu7L/1/QCdQuslSq9RoWOv+9fgfP5R0ApkV/ue:zYCLt/QCdQuSborvSYv0FV
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-