General
-
Target
free_robux.exe
-
Size
60KB
-
Sample
240414-xx91rabc85
-
MD5
2e507f0800812783436579e8c6b39c08
-
SHA1
ab33967acff2c926af1b37665d552242cda0c66b
-
SHA256
34e3ef1782f00fc1145dcd343ad0bb4dd3b1e6b339ec44e894457ed993c96180
-
SHA512
5f085ce73807baf14888de4f6ea2e0fb0ec3f60dfbd4de5db219d434a0b69044d7f434f7f7e295572b925f0fba5dacc3debb8adda6d4f51f555883774dcafa50
-
SSDEEP
768:HX06/2vJPE9g8CoiesliFBl3WnWRPlNz30iB9L1zIOJlqYWoK4Xo:E6/2vO9g8CoiedwWRNxDzaoc
Static task
static1
Behavioral task
behavioral1
Sample
free_robux.exe
Resource
win10-20240404-en
Malware Config
Extracted
discordrat
-
discord_token
MTA2ODI0MTMyMDk4MTgyNzU5NA.GDi6tE.t2T-c9UBEtvdju9XJt2A5HWfqJ2wasQ2apTfdg
-
server_id
1068241914974974063
Targets
-
-
Target
free_robux.exe
-
Size
60KB
-
MD5
2e507f0800812783436579e8c6b39c08
-
SHA1
ab33967acff2c926af1b37665d552242cda0c66b
-
SHA256
34e3ef1782f00fc1145dcd343ad0bb4dd3b1e6b339ec44e894457ed993c96180
-
SHA512
5f085ce73807baf14888de4f6ea2e0fb0ec3f60dfbd4de5db219d434a0b69044d7f434f7f7e295572b925f0fba5dacc3debb8adda6d4f51f555883774dcafa50
-
SSDEEP
768:HX06/2vJPE9g8CoiesliFBl3WnWRPlNz30iB9L1zIOJlqYWoK4Xo:E6/2vO9g8CoiedwWRNxDzaoc
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-