Analysis
-
max time kernel
127s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2024 17:28
Behavioral task
behavioral1
Sample
Robux.exe
Resource
win7-20231215-en
General
-
Target
Robux.exe
-
Size
274KB
-
MD5
b3dca103204683157780d5562579d100
-
SHA1
61a249df0a3ce1849b7047e252a323c9f26e44c4
-
SHA256
8077c458cca5d446d5699c86d18cd2ed03507f59ab09582a1147e17291f33c65
-
SHA512
89c4335aafa72a286b34460790abe4aa9e035db269f9b5e451a85c98326aa87b31d60a6742125011a54f421283e11cc5cf56d7fccfdcdff95d36dac21abec556
-
SSDEEP
6144:Af+BLtABPDOpJTNN6eTSUdZ/pOlYeJqlA1D0FkB:ppYSSUdZ/olYet1DHB
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/915691701547446283/wUW0ZMfS9Ea3nfJC3GBW1nyVurXzKmQnFhIAcuEwGucZF2JJhh8YakLcl2RpJb6iFOek
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 freegeoip.app 7 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Robux.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Robux.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Robux.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Robux.exepid process 3248 Robux.exe 3248 Robux.exe 3248 Robux.exe 3248 Robux.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Robux.exedescription pid process Token: SeDebugPrivilege 3248 Robux.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
735B
MD53fb84e8134965d11d5ef8bdbdda94464
SHA137780e672aca9f37b3235ab5d3e131b5228dd979
SHA256f6992a03a245ca075c97d44b3dccc0a48bb19950c59d13703718843279744c57
SHA5121c78df9f46be7315a474f05d48e1f343e47ef87858fd2498104660aa06723125aef32b1be1a590367968367a41d24ab1e9d1775b35b1a1018350a2a290bd442f
-
Filesize
1KB
MD5250ced268cbea0a9a96a4ae7f61217c4
SHA1e65dc68250a791e7a0c7acab1ddac719f64107fa
SHA256f1ad8c6f17aceb2ac1ddee1700b4d21b0d37715e8a13cd2c8a2f573394b7845b
SHA512b7a20b7f9f4b7067f7bf47bb6536f954269dd5df9276ab2910e48c5f1a39ad23c1993ba7a41622092bc5e24d85f99613aaf7c71660b663fb9250bf1cc6a34dba