General

  • Target

    RobloxPlayerInstaller.exe

  • Size

    4.6MB

  • Sample

    240813-2x86nsvgkl

  • MD5

    f2ab971188e38589e09627a28c6a4166

  • SHA1

    c06b344bb4549cc3c544bc4e806765e732c295fb

  • SHA256

    4e51c3c2d137c03478fb5baccd01fea368c9af1d6140947be5c959f2b7ff132e

  • SHA512

    031c8c895a690ae422b4fed61d5596044a4314a6365386ee7baaf246987cb998bb071f7f55f3a22cbdea0a2bc0d7e6fefe345046feaa6d4f5efff39bcf6803c7

  • SSDEEP

    98304:Snv+fpQMp+3DTM7iK4lH0Fg33rlZqSkwaSfSyq7Gba:KIQpDOiK4Kgnz1ftvu

Malware Config

Targets

    • Target

      RobloxPlayerInstaller.exe

    • Size

      4.6MB

    • MD5

      f2ab971188e38589e09627a28c6a4166

    • SHA1

      c06b344bb4549cc3c544bc4e806765e732c295fb

    • SHA256

      4e51c3c2d137c03478fb5baccd01fea368c9af1d6140947be5c959f2b7ff132e

    • SHA512

      031c8c895a690ae422b4fed61d5596044a4314a6365386ee7baaf246987cb998bb071f7f55f3a22cbdea0a2bc0d7e6fefe345046feaa6d4f5efff39bcf6803c7

    • SSDEEP

      98304:Snv+fpQMp+3DTM7iK4lH0Fg33rlZqSkwaSfSyq7Gba:KIQpDOiK4Kgnz1ftvu

    • Checks whether UAC is enabled

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks