General

  • Target

    ROBLOX.exe

  • Size

    61KB

  • Sample

    240630-nfnlrazfjp

  • MD5

    436430d4019b9c9296de7bcb64e72c8c

  • SHA1

    900e15a469b7fc676a805976a1953b966d582f23

  • SHA256

    2abf33a81c6bde129ab2b3a632098ccc9d886bbb100037636f649445d26c992a

  • SHA512

    7d76e7adce2fe1530b298f43c1e277930e25fd201f69e90a96950abe64c72019125ae3ec2253e727e95f878af1aa36fe970546c8fec0091b19db76a8d26500ec

  • SSDEEP

    1536:FpfEKNCj6VoJl9Go5K7s4Nu3cHXGnouy8lC:FVZ/VGS7rN+c2out

Malware Config

Targets

    • Target

      ROBLOX.exe

    • Size

      61KB

    • MD5

      436430d4019b9c9296de7bcb64e72c8c

    • SHA1

      900e15a469b7fc676a805976a1953b966d582f23

    • SHA256

      2abf33a81c6bde129ab2b3a632098ccc9d886bbb100037636f649445d26c992a

    • SHA512

      7d76e7adce2fe1530b298f43c1e277930e25fd201f69e90a96950abe64c72019125ae3ec2253e727e95f878af1aa36fe970546c8fec0091b19db76a8d26500ec

    • SSDEEP

      1536:FpfEKNCj6VoJl9Go5K7s4Nu3cHXGnouy8lC:FVZ/VGS7rN+c2out

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Stops running service(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks