General

  • Target

    free standoff 2 cheat and robux.exe

  • Size

    10.8MB

  • Sample

    240617-l4k5eswcjb

  • MD5

    1259a074efaa877850e6ba28741f01e5

  • SHA1

    1325fc7e43dddd8438309e4e090034d9e7e821ed

  • SHA256

    f1469749bfb93a2e942313504d4b3d846ed2261ff9be77366e00fa9ef23eb439

  • SHA512

    2e201a3e734191caed388a8db2707d501c97809c47b1c961af51d933a9afa3d5364dd78c8f138c475e6a0835f7bf60b50dc4a6c6e70da1ec1c28846014bf540b

  • SSDEEP

    196608:V6Ekh1kb5RhqL1W903eV4QRM993iObMAR1jQmGY1SEKuLmhril91P+klv:cEkh2F/IW+eGQRe93iObLRS/PcLorib5

Malware Config

Targets

    • Target

      free standoff 2 cheat and robux.exe

    • Size

      10.8MB

    • MD5

      1259a074efaa877850e6ba28741f01e5

    • SHA1

      1325fc7e43dddd8438309e4e090034d9e7e821ed

    • SHA256

      f1469749bfb93a2e942313504d4b3d846ed2261ff9be77366e00fa9ef23eb439

    • SHA512

      2e201a3e734191caed388a8db2707d501c97809c47b1c961af51d933a9afa3d5364dd78c8f138c475e6a0835f7bf60b50dc4a6c6e70da1ec1c28846014bf540b

    • SSDEEP

      196608:V6Ekh1kb5RhqL1W903eV4QRM993iObMAR1jQmGY1SEKuLmhril91P+klv:cEkh2F/IW+eGQRe93iObLRS/PcLorib5

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks