General

  • Target

    RobloxPlayerLauncher.exe

  • Size

    4.7MB

  • Sample

    240325-zyjlashe67

  • MD5

    bcfb5b5e9e780e7ef4d281eb0efed185

  • SHA1

    1df3d047508756dee25170d1022c3fd165d861ea

  • SHA256

    ed8ba6067230192e4f3a2a988adb331d4294951aa54e310fb92386b4cba6b506

  • SHA512

    671061976259b2be43bcd64e4df3503b7be866541213d06f5b4f931c415a5636d6405fdfc56d6afc1d7945bbe744d74ba6b8d8d1be314b85530d8abade00a042

  • SSDEEP

    98304:T6vOyt+rRWwLkw3wNRxt1TNxQgwougV27bNgK+Ezoi1F0bdPZu:6OuERWw0Nvog0pzPshZu

Malware Config

Targets

    • Target

      RobloxPlayerLauncher.exe

    • Size

      4.7MB

    • MD5

      bcfb5b5e9e780e7ef4d281eb0efed185

    • SHA1

      1df3d047508756dee25170d1022c3fd165d861ea

    • SHA256

      ed8ba6067230192e4f3a2a988adb331d4294951aa54e310fb92386b4cba6b506

    • SHA512

      671061976259b2be43bcd64e4df3503b7be866541213d06f5b4f931c415a5636d6405fdfc56d6afc1d7945bbe744d74ba6b8d8d1be314b85530d8abade00a042

    • SSDEEP

      98304:T6vOyt+rRWwLkw3wNRxt1TNxQgwougV27bNgK+Ezoi1F0bdPZu:6OuERWw0Nvog0pzPshZu

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks