General
-
Target
ROBLOX_MULTI_x64.exe
-
Size
11KB
-
Sample
231104-a1lq1abd6t
-
MD5
4261af7c34b48c77817f52033fb0539f
-
SHA1
e1e79a7e69cdb35e758591ea98d63c583b2eea26
-
SHA256
7115a0adc6ee5d127e9ede11b89d253bb6350342bca69eb1845a05ec977a1629
-
SHA512
876c30f9ccf654aabd70d947b75e80e120ffc5460aafb3d4ebc0bc52253f3ae9f6551d89db42ef0ee37d026ec764328212c280d649c14c90630e78c68817bfa4
-
SSDEEP
192:AvAdKg7Z5wAe6vpKpyVMmE8lZuuPe3Q5tmUKSJ:0CKg7Delpygvu23DS
Static task
static1
Malware Config
Targets
-
-
Target
ROBLOX_MULTI_x64.exe
-
Size
11KB
-
MD5
4261af7c34b48c77817f52033fb0539f
-
SHA1
e1e79a7e69cdb35e758591ea98d63c583b2eea26
-
SHA256
7115a0adc6ee5d127e9ede11b89d253bb6350342bca69eb1845a05ec977a1629
-
SHA512
876c30f9ccf654aabd70d947b75e80e120ffc5460aafb3d4ebc0bc52253f3ae9f6551d89db42ef0ee37d026ec764328212c280d649c14c90630e78c68817bfa4
-
SSDEEP
192:AvAdKg7Z5wAe6vpKpyVMmE8lZuuPe3Q5tmUKSJ:0CKg7Delpygvu23DS
-
Downloads MZ/PE file
-
Modifies Installed Components in the registry
-
Sets file execution options in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-