General

  • Target

    RBXpannel.exe

  • Size

    15.8MB

  • Sample

    240207-aetjqacedq

  • MD5

    6b633d08e1dfb5b24cd5d781f859e3ea

  • SHA1

    df70d18aa28f2f0124b770b618038eca05be5b31

  • SHA256

    7915d1944ec2780bed64a19249568ea68a18a98e4786425304d8f38800daef29

  • SHA512

    4b4a9920ea548fea51bb903055b5350c67cb29ac4ff4b9482a89bbc2b9e5984e0fddea5ffab5c1e7c9811e4bfce2d71107d552dbde79ea897e80ce74876d6b9c

  • SSDEEP

    393216:USEkMD2ntpUTLfhJsW+eGQRCMTozGxu8C0ibfz6e57Y1bmXiWCUI:USUDaHUTLJSW+e5RLoztZ026e5WFVUI

Malware Config

Targets

    • Target

      RBXpannel.exe

    • Size

      15.8MB

    • MD5

      6b633d08e1dfb5b24cd5d781f859e3ea

    • SHA1

      df70d18aa28f2f0124b770b618038eca05be5b31

    • SHA256

      7915d1944ec2780bed64a19249568ea68a18a98e4786425304d8f38800daef29

    • SHA512

      4b4a9920ea548fea51bb903055b5350c67cb29ac4ff4b9482a89bbc2b9e5984e0fddea5ffab5c1e7c9811e4bfce2d71107d552dbde79ea897e80ce74876d6b9c

    • SSDEEP

      393216:USEkMD2ntpUTLfhJsW+eGQRCMTozGxu8C0ibfz6e57Y1bmXiWCUI:USUDaHUTLJSW+e5RLoztZ026e5WFVUI

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks