General

  • Target

    Roblox Modified Client.rar

  • Size

    66.5MB

  • Sample

    240817-mt7q4s1fpb

  • MD5

    3b556a30ade963ed946b62339461f79f

  • SHA1

    6e0b5faf086120035b690d3adfdd175e9a87ab8a

  • SHA256

    13f3c7f4a51b1f38fad3bed708db62f3cab9e03b31f13943d0168dcdea117a62

  • SHA512

    afd4c45dce55065776859da93ffbb61fe20e7ec6bd86b428e3753a05513e8d297a3a569844c7142c72fd97712a57751f25c6e8f4e5beb02f5c0757a46adc789c

  • SSDEEP

    1572864:yrtfgKq+wJdSpp0sSlpeUpOoyFXGaBLOVFGsXSOAY9WuZ6CSXNDUN870I9cBr:yRUNAbSlpLIxFXGksSOfbZ6DuGHkr

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      68.0MB

    • MD5

      b2c9258b9408c6eac3be467ffe15e5f9

    • SHA1

      be57fc72fe13090f0780b7cd8264936c495a1471

    • SHA256

      f4574e9f3c5c82a37bf7afcf27940f14bfa918b924d418efbe06dec55f6164bc

    • SHA512

      0282ef56bc7984ee3bc66a82578bc837920a182b2b72f04859f6c919436963f8138a320a13f385c8942b3276ea62e0af175b6c062011b707a97f472246109ee5

    • SSDEEP

      1572864:N+WsCp8b8irAH8+1osuTCSxOB6xMLiIpa2qHWB75iVmFsa7rFfE:cJCOb8S6xjKcBa6c2qHO5iVwsa7r5

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks