General

  • Target

    Roblox2FA.exe

  • Size

    1.6MB

  • Sample

    240922-cb6e8awhpf

  • MD5

    2affab709854d6670f9dcc0d22180e4a

  • SHA1

    0a9964c5d2e1060540b223ac4e4f1b36345bea20

  • SHA256

    ed739568e77b668e2f50e5f8a4b2c0edd6297ac368e7b6fb2a8753443f9e90d7

  • SHA512

    83dc9d78837dd0a79f5322d5db15e80de80bf2e9d3fe61ebb159b0e9bab360b7877e66336e05fa3f13ab3dc4f3e0b5ea262be77c38c632c3d736009ac0d603ae

  • SSDEEP

    24576:Yi2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywC0n:HTq24GjdGSiJxkqXfd+/9AqYanCLC

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1286968600208609293/xPnd-ouz-a7o3eTOzmZRLXDkKXO2T8HgPZ3H5VoshI6y1EUrlZ67LyES9vTOAynb97V-

Targets

    • Target

      Roblox2FA.exe

    • Size

      1.6MB

    • MD5

      2affab709854d6670f9dcc0d22180e4a

    • SHA1

      0a9964c5d2e1060540b223ac4e4f1b36345bea20

    • SHA256

      ed739568e77b668e2f50e5f8a4b2c0edd6297ac368e7b6fb2a8753443f9e90d7

    • SHA512

      83dc9d78837dd0a79f5322d5db15e80de80bf2e9d3fe61ebb159b0e9bab360b7877e66336e05fa3f13ab3dc4f3e0b5ea262be77c38c632c3d736009ac0d603ae

    • SSDEEP

      24576:Yi2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywC0n:HTq24GjdGSiJxkqXfd+/9AqYanCLC

    • Stealerium

      An open source info stealer written in C# first seen in May 2022.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks