General

  • Target

    RobloxExecutor.bat

  • Size

    1.1MB

  • MD5

    b3678a6ada63c8e0991cf141f537f0cb

  • SHA1

    c4d32e2f5fa11b19db05983256104a52c9c209ff

  • SHA256

    a9370b00adb3e54ec13d369bd9b975449ec933aa8a3c7fa7d44c026f08bb2445

  • SHA512

    10e9a1e415f6dda542daa80a3b0e2e43d434b37f9a19c9ed2b2d17a8aa7c4dc24c063a7a77bf189afe59c6b28237cc5bca313193df078e656da03fa8705ceefc

  • SSDEEP

    24576:U2G/nvxW3Ww0tnbDb5ObjprOQVR/+2TLq9H909+v:UbA30nnbsPOf

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • RobloxExecutor.bat
    .exe windows:5 windows x86 arch:x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections