General

  • Target

    Roblox_DecompilerDONTLEAK.exe

  • Size

    17.7MB

  • Sample

    240818-awcmjayckk

  • MD5

    2c95112c13cbaafd367179f34cb2c1b4

  • SHA1

    3129724b35622b87407625f7c00dabad924fedfe

  • SHA256

    32a42a21965fd5ebc821a2ddb060461a64e9a0b23bcbc4dbe577ee6da1176fcd

  • SHA512

    9fc954f873d278386b96112db4f2da4995258a69d6695ddfba2f87e99caf8603f3c73ce1e6b5dfaf93760551afb8611aaa04b28bded98ba2931cb75e147a4163

  • SSDEEP

    393216:YqPnLFXlldzrHBRPQECSiGFwgI3jFfsvEfuAwGTI/m:JPLFXLdzrLPQbdvTtFWlGV

Malware Config

Targets

    • Target

      Roblox_DecompilerDONTLEAK.exe

    • Size

      17.7MB

    • MD5

      2c95112c13cbaafd367179f34cb2c1b4

    • SHA1

      3129724b35622b87407625f7c00dabad924fedfe

    • SHA256

      32a42a21965fd5ebc821a2ddb060461a64e9a0b23bcbc4dbe577ee6da1176fcd

    • SHA512

      9fc954f873d278386b96112db4f2da4995258a69d6695ddfba2f87e99caf8603f3c73ce1e6b5dfaf93760551afb8611aaa04b28bded98ba2931cb75e147a4163

    • SSDEEP

      393216:YqPnLFXlldzrHBRPQECSiGFwgI3jFfsvEfuAwGTI/m:JPLFXLdzrLPQbdvTtFWlGV

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks