Overview
overview
7Static
static
3RO-Exec-Roblox.zip
windows11-21h2-x64
1README.md
windows11-21h2-x64
3README.txt
windows11-21h2-x64
3RO-EXEC.exe
windows11-21h2-x64
7cstealer.pyc
windows11-21h2-x64
3auto_load.txt
windows11-21h2-x64
3configs/autosave.cfg
windows11-21h2-x64
3lua51.dll
windows11-21h2-x64
3start.bat
windows11-21h2-x64
1General
-
Target
RO-Exec-Roblox.zip
-
Size
17.9MB
-
Sample
240314-e8ttssch65
-
MD5
db00d50455bc337832a44b0ba0246aab
-
SHA1
2331065e93c9f367342b493aed144a2b672ede1e
-
SHA256
f6a78cefa7457af397ec51bbf0593f062cdd932e932c4cfe0f3e5a2fb2653470
-
SHA512
e3461c5ef7f02f883b4a52f04ee6221161c8183077a4396146d0e44cd5505712221a23539b10cf82acc44e173e6e93671f0a6242a3fc3185a96fb89c8b96f8d7
-
SSDEEP
393216:FgaHdlI3hr/+RL3qfCBi6thIiKuyo9kafQKTkeHXs6Ot6MDw1hHK2Ak/:qWduhr/YafCBi6QFo9v4kkqc6Otu1hu4
Behavioral task
behavioral1
Sample
RO-Exec-Roblox.zip
Resource
win11-20240221-en
Behavioral task
behavioral2
Sample
README.md
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
README.txt
Resource
win11-20240221-en
Behavioral task
behavioral4
Sample
RO-EXEC.exe
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
cstealer.pyc
Resource
win11-20240221-en
Behavioral task
behavioral6
Sample
auto_load.txt
Resource
win11-20240221-en
Behavioral task
behavioral7
Sample
configs/autosave.cfg
Resource
win11-20240214-en
Behavioral task
behavioral8
Sample
lua51.dll
Resource
win11-20240221-en
Behavioral task
behavioral9
Sample
start.bat
Resource
win11-20240221-en
Malware Config
Targets
-
-
Target
RO-Exec-Roblox.zip
-
Size
17.9MB
-
MD5
db00d50455bc337832a44b0ba0246aab
-
SHA1
2331065e93c9f367342b493aed144a2b672ede1e
-
SHA256
f6a78cefa7457af397ec51bbf0593f062cdd932e932c4cfe0f3e5a2fb2653470
-
SHA512
e3461c5ef7f02f883b4a52f04ee6221161c8183077a4396146d0e44cd5505712221a23539b10cf82acc44e173e6e93671f0a6242a3fc3185a96fb89c8b96f8d7
-
SSDEEP
393216:FgaHdlI3hr/+RL3qfCBi6thIiKuyo9kafQKTkeHXs6Ot6MDw1hHK2Ak/:qWduhr/YafCBi6QFo9v4kkqc6Otu1hu4
Score1/10 -
-
-
Target
README.md
-
Size
131B
-
MD5
b0e33b162594126bdbd2d03bf17e036e
-
SHA1
ec5c49ab599e89e5f670e68d9e5f82e7fb90a579
-
SHA256
47ebad068a5f34b631cd52a5c9db570a73614e495166c6e66b3ea13a1a962f71
-
SHA512
ddbf5038ac7fcbdeca9e0f75b92a3fa673fd8d63d6e6a4495f8a5d31f5fae102c3fe62ebcd847fe8bc14d4141727ef877b4289bc1babe540352b732fc118ce69
Score3/10 -
-
-
Target
README.txt
-
Size
928B
-
MD5
4a696fefeef0bae73a3358e7bba47413
-
SHA1
da4ba272db35131c93af20d019d10502c80485a5
-
SHA256
dc45080b1009ad874227ef73d1cadfc8ee13eb9778d49830da102af248b6f067
-
SHA512
5be178f006d42816b2c5ef237bdc117058d624561318393e4e75ec36e12c2349e8fb8f3c0a9bcefd78891b0cbb4e57a8e27542b79af6af474b40a5a2b1c06382
Score3/10 -
-
-
Target
RO-EXEC.exe
-
Size
17.7MB
-
MD5
9baf333533526671666a7258dba662a3
-
SHA1
88d20788f856b493974a90458351742d6d051021
-
SHA256
af6aa2d72fae208563ecb1cbd371dd317dec9635ab5dcd10aab753b0c60ab71a
-
SHA512
fcb81321814b1dfb4c9e61b6f5c8bdc12a1e6fffd6674b2eb162558f8439169fd40713d4dc2857c9f3b6e12cdba1006374f7eeed9f1e01bdf13b8bb371ef5535
-
SSDEEP
393216:2u7L/m1lc3GH6YkDInEroXz/m3pmsKkXggwW+TA39BYBJHXz4vvfZV1hNHSUr:2CLe1cGHfjErUzKmoxbQA3ry38vvH1hP
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
cstealer.pyc
-
Size
41KB
-
MD5
0c49b027bb3141562b60489be1240223
-
SHA1
4b9e3a0f5585b19c578e4e9d1549e84f1a3054c8
-
SHA256
ea4b0a467afe19ca827f5a520b24b1f8c03379ceac962a99767492f6d976101f
-
SHA512
db68deb078f671ca07850ad0c48477b49fd6bf17f5ae8401a9a2b186c7e0619a201930b780f879007b2ed575e8d3ba6d306f82fc7218133f65a9dbd8868b9305
-
SSDEEP
768:gRHGE04WPV4O3Oo0horA3ZJs84vaAEmaAqxN1ZUi/qq6rgWigm4Ag7HHrQZuHoiL:kGyE5yhhJs8eafRZUkq5rgWig7AmmnE5
Score3/10 -
-
-
Target
auto_load.txt
-
Size
191KB
-
MD5
2c88d595bd58a3f1c5292a4d93285691
-
SHA1
5efaacec322a880e293b2ffe50af613a7ecf6ba5
-
SHA256
1d09d39eb00a2b36143076d41269f547fb01f0c7091b2f3c19bc8a2bdbe6a82e
-
SHA512
88d12d556753bf870d584183027017a7a0b531a1fd51703eb39545bced7af83698cc4beb2e9540d6ab5837cd43af0b3d704bb7ef94c7b1ef4b3c72080c1d8bb5
-
SSDEEP
3072:ZX+4sdNphRBeTy01+Op/MbaOPGut+rAyiMvwxArJ7q/B:5KxkBI0kb3yrARqJa
Score3/10 -
-
-
Target
configs/autosave.cfg
-
Size
916B
-
MD5
024ab27dfe02dbcd5357528ac4dbe028
-
SHA1
2f2b7df7b4557e274d4255cebd65d6d7c125cf95
-
SHA256
c029522bb51f2eea602e3818be4b495282cc2d8da92421f8bf3ced7dc46098bd
-
SHA512
f87d48447e5663be7e63f7f7934d33c795f2201acc753720bbf77af49cf8ab44b6f9618a2a22dd8f08a5d67424ca0c7c566b15b3f172edc34af4b29a23b5d137
Score3/10 -
-
-
Target
lua51.dll
-
Size
592KB
-
MD5
3dff7448b43fcfb4dc65e0040b0ffb88
-
SHA1
583cdab08519d99f49234965ffd07688ccf52c56
-
SHA256
ff976f6e965e3793e278fa9bf5e80b9b226a0b3932b9da764bffc8e41e6cdb60
-
SHA512
cdcbe0ec9ddd6b605161e3c30ce3de721f1333fce85985e88928086b1578435dc67373c3dc3492ed8eae0d63987cac633aa4099b205989dcbb91cbbfc8f6a394
-
SSDEEP
12288:rs7/mj/73RaLHIW5BmUeUhoE4RgiF1q1bPIBKsg4Db0S:rc/u/7IoRnUKfq1Dl4DY
Score3/10 -
-
-
Target
start.bat
-
Size
549B
-
MD5
5474f8e86ff754653187fc4e9631091d
-
SHA1
df11da7d2970dec07fe959e10c81b75a416a81d6
-
SHA256
b815050f9eac79e83efe90d6ea89f65ecb23e6653aef5c1f04f2f9fb1d118bc5
-
SHA512
39003b46eafad9705a12ce7c5a97b99a49760e72d67c4e7dc3aa30480d74a21535950241898ce78128342232677cfaa41b46aa3e51dbac0d713ed9b2054e8066
Score1/10 -