General

  • Target

    RobloxPlayerInstaller (2).exe

  • Size

    5.5MB

  • Sample

    240818-dfhqdsvbpr

  • MD5

    6399cb94a0d00b72ffb53432cb26c891

  • SHA1

    d18c3616da0c6807771c0d7e501e811a9f2e7ded

  • SHA256

    fec985e0648a7d41c434c8fed666139090f7bb5df85939da743a1f8859765811

  • SHA512

    5f06f6e235c1e1c68255cf34fa22713ddd8a8667d9584ba316358c785801a0d9ca68a93ff2c2b20d55bca5c0502a2edaa2a06a8f45fec2292b880725f8ee5097

  • SSDEEP

    98304:bCvzi7JmlycwWDA64XNj4IdfgT2WXa12zRMBZo8X7xuHit:qzIJmldv4j3gT2czRaoW7xDt

Malware Config

Targets

    • Target

      RobloxPlayerInstaller (2).exe

    • Size

      5.5MB

    • MD5

      6399cb94a0d00b72ffb53432cb26c891

    • SHA1

      d18c3616da0c6807771c0d7e501e811a9f2e7ded

    • SHA256

      fec985e0648a7d41c434c8fed666139090f7bb5df85939da743a1f8859765811

    • SHA512

      5f06f6e235c1e1c68255cf34fa22713ddd8a8667d9584ba316358c785801a0d9ca68a93ff2c2b20d55bca5c0502a2edaa2a06a8f45fec2292b880725f8ee5097

    • SSDEEP

      98304:bCvzi7JmlycwWDA64XNj4IdfgT2WXa12zRMBZo8X7xuHit:qzIJmldv4j3gT2czRaoW7xDt

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks