General
-
Target
RCO.exe
-
Size
224KB
-
Sample
240218-jwdn9sgb45
-
MD5
0e0d953a913ece5f75334a3b4cf10e60
-
SHA1
669855b30d0a743b8845f0fd21beb3ce3bfab096
-
SHA256
1d75322446c9594ca5924176a2006c241f89c10e1cbcf60c1c21b305e210100f
-
SHA512
a04e15e00aeb516d0973979fa0bd076e27a0b74aa94234608b009571d7d560aadbf116808812a171efc9c309f0a1d34e6b5ec232d9ef7e9f796ed96c5b61ddc3
-
SSDEEP
6144:5BlkZvaF4NTBXR7zzALBp7VMfct/hSKUKq438eaUhjCZryZ:5oSWNT9tzALPtt/Bj38e+rI
Static task
static1
Behavioral task
behavioral1
Sample
RCO.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
RCO.exe
Resource
win10-20240214-en
Behavioral task
behavioral3
Sample
RCO.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
RCO.exe
Resource
win11-20240214-en
Malware Config
Extracted
https://raw.githubusercontent.com/o5u3/Roblox-Client-Optimizer/version/latestversion
Targets
-
-
Target
RCO.exe
-
Size
224KB
-
MD5
0e0d953a913ece5f75334a3b4cf10e60
-
SHA1
669855b30d0a743b8845f0fd21beb3ce3bfab096
-
SHA256
1d75322446c9594ca5924176a2006c241f89c10e1cbcf60c1c21b305e210100f
-
SHA512
a04e15e00aeb516d0973979fa0bd076e27a0b74aa94234608b009571d7d560aadbf116808812a171efc9c309f0a1d34e6b5ec232d9ef7e9f796ed96c5b61ddc3
-
SSDEEP
6144:5BlkZvaF4NTBXR7zzALBp7VMfct/hSKUKq438eaUhjCZryZ:5oSWNT9tzALPtt/Bj38e+rI
Score10/10-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-