General

  • Target

    Low-Gfx-Roblox-Testing.exe

  • Size

    19.3MB

  • Sample

    231013-kpb3jahh59

  • MD5

    e76ad2fb644d0caeded4b90b71034ca7

  • SHA1

    b39ff2bf5605ad45ee75f3b52934a1b2eb4efdab

  • SHA256

    8a5e9e5e733fadbf41e9d75f300b1e7dbe9b420d2a8dd433327389fdd7901d03

  • SHA512

    54d8a2217e155f44a1d9528591a812500b1e811dd664fa66126aae58f8de29976c5238e29eefbf9dc7155d0e001c84eb5dd64d133c5c9df1f91b4fad886014f6

  • SSDEEP

    393216:B7TO9Sd9QDc8j0HbTlZ3S1bv8bdY5H7zGCkdZmqe:dTCqQI8IHlZWz8Wgp5

Malware Config

Targets

    • Target

      Low-Gfx-Roblox-Testing.exe

    • Size

      19.3MB

    • MD5

      e76ad2fb644d0caeded4b90b71034ca7

    • SHA1

      b39ff2bf5605ad45ee75f3b52934a1b2eb4efdab

    • SHA256

      8a5e9e5e733fadbf41e9d75f300b1e7dbe9b420d2a8dd433327389fdd7901d03

    • SHA512

      54d8a2217e155f44a1d9528591a812500b1e811dd664fa66126aae58f8de29976c5238e29eefbf9dc7155d0e001c84eb5dd64d133c5c9df1f91b4fad886014f6

    • SSDEEP

      393216:B7TO9Sd9QDc8j0HbTlZ3S1bv8bdY5H7zGCkdZmqe:dTCqQI8IHlZWz8Wgp5

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks