Overview
overview
3Static
static
3RobloxExecutor.zip
windows7-x64
1RobloxExecutor.zip
windows10-2004-x64
1Executor/Executor.exe
windows7-x64
1Executor/Executor.exe
windows10-2004-x64
1Executor/Solara.dll
windows7-x64
1Executor/Solara.dll
windows10-2004-x64
1Executor/c...10.dll
windows7-x64
1Executor/c...10.dll
windows10-2004-x64
1Executor/libcurl.dll
windows7-x64
1Executor/libcurl.dll
windows10-2004-x64
1Executor/sqlite3.dll
windows7-x64
1Executor/sqlite3.dll
windows10-2004-x64
1Resubmissions
20/08/2024, 20:56
240820-zq7cdswhnj 320/08/2024, 20:55
240820-zqvctswhlr 320/08/2024, 20:55
240820-zqgrqssgqe 3Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
RobloxExecutor.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
RobloxExecutor.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Executor/Executor.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Executor/Executor.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Executor/Solara.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Executor/Solara.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Executor/cpprest_2_10.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Executor/cpprest_2_10.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Executor/libcurl.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Executor/libcurl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Executor/sqlite3.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Executor/sqlite3.dll
Resource
win10v2004-20240802-en
General
-
Target
Executor/sqlite3.dll
-
Size
1.0MB
-
MD5
208ed4329a5a9004a54a5cc69421a557
-
SHA1
e85013a6a51e2e30fa17bf368172b5a110125bce
-
SHA256
78d7836f0e60fffc501252bdb2be5a3ddfc567c7a3f31a2d9b459621b489325b
-
SHA512
4feabb67bbfc5e31a519c841e9e03cc973f9037ff439960bedecbf16df96e4c6b019d6b8aa9166757b3a23e52207b1a5e90585c9ebfbc177704c3ddaefa9d381
-
SSDEEP
24576:4GpVRWohhfjEIoehUg2QdEYO11oNa27PB79dBYf510y:4Y5zxoFFDYO1SN/Ly10y
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1964 wrote to memory of 3056 1964 rundll32.exe 30 PID 1964 wrote to memory of 3056 1964 rundll32.exe 30 PID 1964 wrote to memory of 3056 1964 rundll32.exe 30