General
-
Target
Roblox2FA.exe
-
Size
1.6MB
-
Sample
240922-cb6e8awhpf
-
MD5
2affab709854d6670f9dcc0d22180e4a
-
SHA1
0a9964c5d2e1060540b223ac4e4f1b36345bea20
-
SHA256
ed739568e77b668e2f50e5f8a4b2c0edd6297ac368e7b6fb2a8753443f9e90d7
-
SHA512
83dc9d78837dd0a79f5322d5db15e80de80bf2e9d3fe61ebb159b0e9bab360b7877e66336e05fa3f13ab3dc4f3e0b5ea262be77c38c632c3d736009ac0d603ae
-
SSDEEP
24576:Yi2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywC0n:HTq24GjdGSiJxkqXfd+/9AqYanCLC
Behavioral task
behavioral1
Sample
Roblox2FA.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Roblox2FA.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1286968600208609293/xPnd-ouz-a7o3eTOzmZRLXDkKXO2T8HgPZ3H5VoshI6y1EUrlZ67LyES9vTOAynb97V-
Targets
-
-
Target
Roblox2FA.exe
-
Size
1.6MB
-
MD5
2affab709854d6670f9dcc0d22180e4a
-
SHA1
0a9964c5d2e1060540b223ac4e4f1b36345bea20
-
SHA256
ed739568e77b668e2f50e5f8a4b2c0edd6297ac368e7b6fb2a8753443f9e90d7
-
SHA512
83dc9d78837dd0a79f5322d5db15e80de80bf2e9d3fe61ebb159b0e9bab360b7877e66336e05fa3f13ab3dc4f3e0b5ea262be77c38c632c3d736009ac0d603ae
-
SSDEEP
24576:Yi2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywC0n:HTq24GjdGSiJxkqXfd+/9AqYanCLC
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1