General

  • Target

    RobloxPlayerInstaller.exe

  • Size

    6.8MB

  • Sample

    241118-y43qpazjgm

  • MD5

    91563396f82674c0b8a13a5bd4faa2cc

  • SHA1

    becfde376e3053a2593640e8fbb743890077ed07

  • SHA256

    c4e4b832dfab883152602b2ffef83f57281ebd8d08b3b8b12540f580fe0526d0

  • SHA512

    07ee5e4084c24885ce735e93c314700dfaad96bf1b65e63a36a9c14c9f91a14fb6d4e26a534627e6a0df9416ce6a80f0539af3e50d5606489638a36b6da95e09

  • SSDEEP

    98304:Mcv+QirHeUqMuUP0vjg9bJnAVxlVvq0waHsdRblAH4qPSAupG+udFJp0:HpirHeUqOYkJSqcHsdRbgPQpB83a

Malware Config

Targets

    • Target

      RobloxPlayerInstaller.exe

    • Size

      6.8MB

    • MD5

      91563396f82674c0b8a13a5bd4faa2cc

    • SHA1

      becfde376e3053a2593640e8fbb743890077ed07

    • SHA256

      c4e4b832dfab883152602b2ffef83f57281ebd8d08b3b8b12540f580fe0526d0

    • SHA512

      07ee5e4084c24885ce735e93c314700dfaad96bf1b65e63a36a9c14c9f91a14fb6d4e26a534627e6a0df9416ce6a80f0539af3e50d5606489638a36b6da95e09

    • SSDEEP

      98304:Mcv+QirHeUqMuUP0vjg9bJnAVxlVvq0waHsdRblAH4qPSAupG+udFJp0:HpirHeUqOYkJSqcHsdRbgPQpB83a

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks