General

  • Target

    roblox.exe.zip

  • Size

    42KB

  • Sample

    240913-yfp5pawald

  • MD5

    87b12ff8e073fbdef673148d57b8bb58

  • SHA1

    c7d7ab8a13827c51ab3253ab27ce41d4f37a6ef6

  • SHA256

    f836f434c1838848a04ad5efd4f15e17fc7dff033dd8a1d75fab318c0aad07f5

  • SHA512

    5002ecfd03488227918b2d125060d467ed582a54b05ef9e81e8b667e0e23de705cf3a8c614f6a713c630f73f7f412cddbddb6df66ba3bb2e6afcb44878c5537c

  • SSDEEP

    768:0CFEVWohxVp/pzJs2YHuBWs8ZIBpIAwaMLygG0DHlCu5yZkTPr3Bw/HpMe4ai2ux:rFFolpzs2ei8EIAwaMLDjDctc3WH+t2K

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.0.2.15:4444

Targets

    • Target

      roblox.exe

    • Size

      72KB

    • MD5

      3de98651e4cc6877588ea2775cbb466f

    • SHA1

      28cad789918bd702694bede10b5478d4a0cb1c33

    • SHA256

      2741fb3e11309ea9333b9ae05fcbcc3ee808e9c92a831a782f44bf69c82f1681

    • SHA512

      c63edea099b1d5995ad2e95a4beeef545a5fc5c54f3bb47fd83ab61c32756fc784dc9e508557e239b49147e8d7f994aa1606292b9a2bc2d9a305cb6e5353d0b3

    • SSDEEP

      1536:Ier/Cvc2Km5O2+vVzBvRJs6F7UxwMMb+KR0Nc8QsJq39:ZrCvc2Kmd+9zBTAxFe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Enterprise v15

Tasks