General
-
Target
Roblox.exe
-
Size
1.1MB
-
Sample
241121-smd34sxnep
-
MD5
c99de49cafe024cda7d3e0a38aff5c55
-
SHA1
9aabf85ffeb296e8837801b86bd0db5d7bc09584
-
SHA256
ddbfbdf18dedc2329792c6fe87a8ac12486b54356ac3557d85b6b8282f8b2ca2
-
SHA512
9f7297343de31d9a5361b4273f28065f2e72c39650e09fe98295655a9d1d18c5f99898e988ce3c96c463d3708398e226b400d0495592f43c0b4232eddb76d12c
-
SSDEEP
24576:U2G/nvxW3Ww0tnZoqM4yV6IcCnVjMAarg8bc6C:UbA30nZ9M4ecgxB
Behavioral task
behavioral1
Sample
Roblox.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Roblox.exe
-
Size
1.1MB
-
MD5
c99de49cafe024cda7d3e0a38aff5c55
-
SHA1
9aabf85ffeb296e8837801b86bd0db5d7bc09584
-
SHA256
ddbfbdf18dedc2329792c6fe87a8ac12486b54356ac3557d85b6b8282f8b2ca2
-
SHA512
9f7297343de31d9a5361b4273f28065f2e72c39650e09fe98295655a9d1d18c5f99898e988ce3c96c463d3708398e226b400d0495592f43c0b4232eddb76d12c
-
SSDEEP
24576:U2G/nvxW3Ww0tnZoqM4yV6IcCnVjMAarg8bc6C:UbA30nZ9M4ecgxB
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-