General

  • Target

    Injector Roblox.bat

  • Size

    2KB

  • Sample

    241113-yxpv9a1rfl

  • MD5

    909d5d31a0442d9d894f86ba35aa24c3

  • SHA1

    3ca14a7f9694b05f27aa431a1eaa151f9cbd978b

  • SHA256

    c2dfd23c17090df4fb47af04959e666b00d3a24a2f2d31838fae99a5fbb9f458

  • SHA512

    a13702b01b6ae4143e439963cfe50bdc847e7af7aecde200e8175d5e7aa24288f72dab5c6f55772d08a7a83b3e6d6fc60373b4c0729d9a54f4ee2cd64348e417

Score
8/10

Malware Config

Targets

    • Target

      Injector Roblox.bat

    • Size

      2KB

    • MD5

      909d5d31a0442d9d894f86ba35aa24c3

    • SHA1

      3ca14a7f9694b05f27aa431a1eaa151f9cbd978b

    • SHA256

      c2dfd23c17090df4fb47af04959e666b00d3a24a2f2d31838fae99a5fbb9f458

    • SHA512

      a13702b01b6ae4143e439963cfe50bdc847e7af7aecde200e8175d5e7aa24288f72dab5c6f55772d08a7a83b3e6d6fc60373b4c0729d9a54f4ee2cd64348e417

    Score
    8/10
    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks