General
-
Target
roblox-player.exe
-
Size
78KB
-
Sample
240511-vxxz3sca29
-
MD5
1e45a9dde0fa43462d3132a6409d6bd3
-
SHA1
9da3717811e4fbd3f5a8a34f5e6a7ed18e20b22a
-
SHA256
292f3a442b476c28afc3249f743025dec25bf27d8b17fe77a981eecf0855de13
-
SHA512
7ad3b6b5cfb79ac02f8c026026ca442f82ee9fec3cf619b32d72ad8ae406a797364b84e4dffaea54f48d3abe3c81b7e109e998330cb734912431e1e666718c4a
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+jPIC:5Zv5PDwbjNrmAE+7IC
Behavioral task
behavioral1
Sample
roblox-player.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
roblox-player.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
discordrat
-
discord_token
MTE5ODIzNjEyMDA3MzM3MTc1OA.G8u0Ka.A4SAtH9lkH8LkHGGBTIXVQMB7VUu6Xrbs9X1kk
-
server_id
1237627992709009478
Targets
-
-
Target
roblox-player.exe
-
Size
78KB
-
MD5
1e45a9dde0fa43462d3132a6409d6bd3
-
SHA1
9da3717811e4fbd3f5a8a34f5e6a7ed18e20b22a
-
SHA256
292f3a442b476c28afc3249f743025dec25bf27d8b17fe77a981eecf0855de13
-
SHA512
7ad3b6b5cfb79ac02f8c026026ca442f82ee9fec3cf619b32d72ad8ae406a797364b84e4dffaea54f48d3abe3c81b7e109e998330cb734912431e1e666718c4a
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+jPIC:5Zv5PDwbjNrmAE+7IC
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-