Resubmissions

14-11-2024 10:30

241114-mj478syank 10

General

  • Target

    RobloxPlayerInstaller.exe

  • Size

    10.4MB

  • Sample

    241114-mj478syank

  • MD5

    44cad07405f2d630314edfc631ac66fb

  • SHA1

    a9c479dc42fa2037e7c2d9bc9c2c9b758fe3d7fa

  • SHA256

    9eb1d758c8ae9797cfe7daaf245e95ae0318b3759d05f2b790cf7a7ca7b0566d

  • SHA512

    2d27161f0087116ba05e7475ee149ccd23fda8824966513bd0ed42d8ee309bafb20716b3cdb0332190ff7949de5c2642c33740c2c369c2f47e9ea72cad2edf48

  • SSDEEP

    196608:lLx0cD/iwCW4MXXEglpxLjv+bhqNVoBKUh8mz4Iv9PQv1DVm:tuiHN4sEcpL+9qz8/b4Imv3m

Malware Config

Targets

    • Target

      RobloxPlayerInstaller.exe

    • Size

      10.4MB

    • MD5

      44cad07405f2d630314edfc631ac66fb

    • SHA1

      a9c479dc42fa2037e7c2d9bc9c2c9b758fe3d7fa

    • SHA256

      9eb1d758c8ae9797cfe7daaf245e95ae0318b3759d05f2b790cf7a7ca7b0566d

    • SHA512

      2d27161f0087116ba05e7475ee149ccd23fda8824966513bd0ed42d8ee309bafb20716b3cdb0332190ff7949de5c2642c33740c2c369c2f47e9ea72cad2edf48

    • SSDEEP

      196608:lLx0cD/iwCW4MXXEglpxLjv+bhqNVoBKUh8mz4Iv9PQv1DVm:tuiHN4sEcpL+9qz8/b4Imv3m

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks