General
-
Target
RobloxHck.exe
-
Size
3.3MB
-
Sample
240920-tbnc3svard
-
MD5
e4f2159efd85213892a279379441d337
-
SHA1
01e1b4c9d5865765d6b916837f9bd9891546b8a4
-
SHA256
be2d8c0dc25bd2a9492c52a0fbe38eead4d2e25ab7a6a3daec53d251a1cde85a
-
SHA512
bba7ccac84134bea5f6efa1a599f1c53443f4b186789327f0028647e5a2009edec24b1e3301193bc0bd703a0b54d0c67fbe1e3a385ae67e701ce63917f0eb39a
-
SSDEEP
98304:732jjwtlamO0IuiBHZLm+W4enHaOJyA1CE+XMGfLWu:CjIaayBHZpWJHa0NgXhfLr
Static task
static1
Behavioral task
behavioral1
Sample
RobloxHck.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
RobloxHck.exe
-
Size
3.3MB
-
MD5
e4f2159efd85213892a279379441d337
-
SHA1
01e1b4c9d5865765d6b916837f9bd9891546b8a4
-
SHA256
be2d8c0dc25bd2a9492c52a0fbe38eead4d2e25ab7a6a3daec53d251a1cde85a
-
SHA512
bba7ccac84134bea5f6efa1a599f1c53443f4b186789327f0028647e5a2009edec24b1e3301193bc0bd703a0b54d0c67fbe1e3a385ae67e701ce63917f0eb39a
-
SSDEEP
98304:732jjwtlamO0IuiBHZLm+W4enHaOJyA1CE+XMGfLWu:CjIaayBHZpWJHa0NgXhfLr
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1