General

  • Target

    Roblox Account Gen.exe

  • Size

    17.1MB

  • Sample

    240708-m5e58swanr

  • MD5

    90521f0f48adac1dd01d798ff8ab86b6

  • SHA1

    707f1dbc63829736027f6baddd6b0a523157245a

  • SHA256

    fc11159c344eaa74b2600fb01a142c7c12d9b00c2e25747bc62bdfc15f0cf3f3

  • SHA512

    9adafccae1e65791418c69835f95a73a866dfdb44a36107247555eb05d3e051567af1657c57d58d61a3b25a9ce7e234c0be7c8124093a3d26ca14aa2871d139e

  • SSDEEP

    393216:kEkZQe1obI/ddQusl+l99oWOv+9fOAsvWDjslv:khQe1h/ddQu/DorvSmAiW3s1

Malware Config

Targets

    • Target

      Roblox Account Gen.exe

    • Size

      17.1MB

    • MD5

      90521f0f48adac1dd01d798ff8ab86b6

    • SHA1

      707f1dbc63829736027f6baddd6b0a523157245a

    • SHA256

      fc11159c344eaa74b2600fb01a142c7c12d9b00c2e25747bc62bdfc15f0cf3f3

    • SHA512

      9adafccae1e65791418c69835f95a73a866dfdb44a36107247555eb05d3e051567af1657c57d58d61a3b25a9ce7e234c0be7c8124093a3d26ca14aa2871d139e

    • SSDEEP

      393216:kEkZQe1obI/ddQusl+l99oWOv+9fOAsvWDjslv:khQe1h/ddQu/DorvSmAiW3s1

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks