General

  • Target

    ROBLOX MOD.exe

  • Size

    1.6MB

  • MD5

    392064084633c2f19ec20085d1dfff51

  • SHA1

    b0a1b04d20ba37f9c2670da091003839a2b6dbec

  • SHA256

    21e87e246cfb847318bc0d21b7a9264a651ba4fd04745ff896ae4cce9188d50c

  • SHA512

    1a8431324fdd12d83c2e2bdae5162c0b4b257784f90448c49042e9bd8b9b7899f6e5ef1166c49488242f983ac7b84ffd50cb1b8345905f42bf163debc95fcb2e

  • SSDEEP

    24576:AfLvRnXG8iksHhbDJBY7mLR0tOD4qABs0e52NmpT6XaNcCYEl0xEMFawP6ILyvCU:6NnXg9YAR1ABsj52g1hVYpzqf2Cv5Q1I

Score
3/10

Malware Config

Signatures

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ROBLOX MOD.exe
    .exe windows:4 windows x86 arch:x86

    f4639a0b3116c2cfc71144b88a929cfd


    Code Sign

    Headers

    Imports

    Sections

  • $INTERNET_CACHE/Discussions
  • $INTERNET_CACHE/Draft
  • $INTERNET_CACHE/Evening
  • $INTERNET_CACHE/Formal
  • $INTERNET_CACHE/Gender
  • $INTERNET_CACHE/Idaho
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections

  • $INTERNET_CACHE/Integral
  • $INTERNET_CACHE/Richards
  • $INTERNET_CACHE/Robots
  • $INTERNET_CACHE/Rule
  • $INTERNET_CACHE/Shopping
  • $INTERNET_CACHE/Slideshow
  • $INTERNET_CACHE/Strip
  • $INTERNET_CACHE/Td
  • $INTERNET_CACHE/Th