General

  • Target

    RobloxBooster.exe

  • Size

    81.8MB

  • Sample

    241009-slhpxaxfnl

  • MD5

    866e379f82855dc76587daf7155fe7d8

  • SHA1

    6041757219f9d74bbb483d11ffe94623660373d1

  • SHA256

    99d9ec0a8c9ccd1ed7f933bcebef79b89ef6f8159cf496ebcb3f300bc7829490

  • SHA512

    6668a8eb64362d8bfc0068e451299da472d8917c3b58f165757a00fd6e56a56f128ad2944360a76f96062a8142114f1220b58b326bc09cd56777562c34cefe59

  • SSDEEP

    1572864:50RQ+j3w8F0Sk8IpG7V+VPhqArYE7FjCNt1WB/4PcPJKWh9be+P1gD:50RvD1F0SkB05awArzu/kB/YcPsu9bNS

Malware Config

Targets

    • Target

      RobloxBooster.exe

    • Size

      81.8MB

    • MD5

      866e379f82855dc76587daf7155fe7d8

    • SHA1

      6041757219f9d74bbb483d11ffe94623660373d1

    • SHA256

      99d9ec0a8c9ccd1ed7f933bcebef79b89ef6f8159cf496ebcb3f300bc7829490

    • SHA512

      6668a8eb64362d8bfc0068e451299da472d8917c3b58f165757a00fd6e56a56f128ad2944360a76f96062a8142114f1220b58b326bc09cd56777562c34cefe59

    • SSDEEP

      1572864:50RQ+j3w8F0Sk8IpG7V+VPhqArYE7FjCNt1WB/4PcPJKWh9be+P1gD:50RvD1F0SkB05awArzu/kB/YcPsu9bNS

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks