Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2023 12:41
Static task
static1
Behavioral task
behavioral1
Sample
RobloxCheatInjector.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
RobloxCheatInjector.exe
Resource
win10v2004-20231215-en
General
-
Target
RobloxCheatInjector.exe
-
Size
13.4MB
-
MD5
f5340a79f33a55311010574d013bb17c
-
SHA1
1552381ccf239d85c1431509713784dc420aa674
-
SHA256
09766b3da2146a553aba42fbaad1694e2e4996dd6d488c2e32bf85429d4852d0
-
SHA512
42f3a21ab1679c534900660acf17c49bc9ce7f9cffb37b259a1d580980a7de03d0177d453c163159695a19e9a0f71f8f0fe6ec26105618bb61b0bef2ce286fd8
-
SSDEEP
3072:3GPqxRvWpV2rSEBLCjiV7ltx/qV/1nBIrsr+T1fAJmZkVTJbtZOyJSp8Bb8EGRf:G+JOIhiulXqV9idqo6TBf8EGh
Malware Config
Extracted
marsstealer
Default
www.msk-post.com/server/string.php
Signatures
-
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4760 3896 WerFault.exe RobloxCheatInjector.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RobloxCheatInjector.exe"C:\Users\Admin\AppData\Local\Temp\RobloxCheatInjector.exe"1⤵PID:3896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 16642⤵
- Program crash
PID:4760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3896 -ip 38961⤵PID:4908