General

  • Target

    RO-Exec-Roblox.zip

  • Size

    17.9MB

  • MD5

    db00d50455bc337832a44b0ba0246aab

  • SHA1

    2331065e93c9f367342b493aed144a2b672ede1e

  • SHA256

    f6a78cefa7457af397ec51bbf0593f062cdd932e932c4cfe0f3e5a2fb2653470

  • SHA512

    e3461c5ef7f02f883b4a52f04ee6221161c8183077a4396146d0e44cd5505712221a23539b10cf82acc44e173e6e93671f0a6242a3fc3185a96fb89c8b96f8d7

  • SSDEEP

    393216:FgaHdlI3hr/+RL3qfCBi6thIiKuyo9kafQKTkeHXs6Ot6MDw1hHK2Ak/:qWduhr/YafCBi6QFo9v4kkqc6Otu1hu4

Score
3/10

Malware Config

Signatures

  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • RO-Exec-Roblox.zip
    .zip
  • README.md
  • README.txt
  • RO-EXEC.exe
    .exe windows:5 windows x64 arch:x64

    1e92fd54d65284238a0e3b74b2715062


    Headers

    Imports

    Sections

  • cstealer.pyc
  • auto_load.txt
  • configs/autosave.cfg
  • lua51.dll
    .dll windows:6 windows x86 arch:x86

    9466a71df1d3a59794f8605626534abe


    Headers

    Imports

    Exports

    Sections

  • start.bat
    .bat .vbs