Resubmissions

13-11-2024 15:32

241113-syq7taxqeq 7

13-11-2024 15:31

241113-syeh1svbjf 6

General

  • Target

    RobloxPlayerInstaller.exe

  • Size

    4.4MB

  • Sample

    241113-syq7taxqeq

  • MD5

    d83a04f09ef727ad39b0f86d0ecf9521

  • SHA1

    ad727fc2f8ee3f98110203ccbcfca131c476116d

  • SHA256

    bc0515e48da581d0257842fc65debaf3387959d6120877313784765ceea72a89

  • SHA512

    5f9e92c7560cc5172858924729e22ec48bf0464f03515c28820177be0b41d4268d00d671e571cd03ec5a57d08332363e5c1b9a728ddda5c1fefcdf6aed550512

  • SSDEEP

    98304:uMvXL33J+JC+pl9J67bcKAoA0Wgw00IIbSJjgV6efbMTxwe:dXLJPUl9Jvvg1hgV9fgd

Malware Config

Targets

    • Target

      RobloxPlayerInstaller.exe

    • Size

      4.4MB

    • MD5

      d83a04f09ef727ad39b0f86d0ecf9521

    • SHA1

      ad727fc2f8ee3f98110203ccbcfca131c476116d

    • SHA256

      bc0515e48da581d0257842fc65debaf3387959d6120877313784765ceea72a89

    • SHA512

      5f9e92c7560cc5172858924729e22ec48bf0464f03515c28820177be0b41d4268d00d671e571cd03ec5a57d08332363e5c1b9a728ddda5c1fefcdf6aed550512

    • SSDEEP

      98304:uMvXL33J+JC+pl9J67bcKAoA0Wgw00IIbSJjgV6efbMTxwe:dXLJPUl9Jvvg1hgV9fgd

    • A potential corporate email address has been identified in the URL: [email protected]

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Legitimate hosting services abused for malware hosting/C2

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks