General
-
Target
Roblox Gen V1.2.7z
-
Size
18KB
-
Sample
240713-tkgxnazcma
-
MD5
d2cb69e5d03e5870167a06d93329abd7
-
SHA1
2a424c8a83089cba8df5122656756409463b0a1b
-
SHA256
0ccce65290f211bd6c32d4b62267149387be9061a66aaf895e605f44c11501d3
-
SHA512
089e92ec5d9249fd856f1380c0578cebed9a7d1b78bc371674ad101ff7e8844322a6453b495fd4a7d403451ede7da65bbd734484c4dfcdeb9c01fd5103889e56
-
SSDEEP
384:R4nVGxinkoNU8khuMwDYZQLUCROQAtO0PrsIuaAcLU+ZoGwjVU:RWVGckhhuMfZQLD/Ao0luaAQUly
Static task
static1
Behavioral task
behavioral1
Sample
Roblox Gen V1.2.7z
Resource
win10v2004-20240709-en
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
PcgXxmrsqCMH
-
delay
3
-
install
true
-
install_file
regergerg.exe
-
install_folder
%AppData%
Targets
-
-
Target
Roblox Gen V1.2.7z
-
Size
18KB
-
MD5
d2cb69e5d03e5870167a06d93329abd7
-
SHA1
2a424c8a83089cba8df5122656756409463b0a1b
-
SHA256
0ccce65290f211bd6c32d4b62267149387be9061a66aaf895e605f44c11501d3
-
SHA512
089e92ec5d9249fd856f1380c0578cebed9a7d1b78bc371674ad101ff7e8844322a6453b495fd4a7d403451ede7da65bbd734484c4dfcdeb9c01fd5103889e56
-
SSDEEP
384:R4nVGxinkoNU8khuMwDYZQLUCROQAtO0PrsIuaAcLU+ZoGwjVU:RWVGckhhuMfZQLD/Ao0luaAQUly
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-