General
-
Target
gensteam.roblox.rar
-
Size
7.3MB
-
Sample
241128-x7r8paxnfx
-
MD5
fe7bef1e96a249efe61c805f99f5879b
-
SHA1
5794822917607cb40a05d5cad09fcfe84333735d
-
SHA256
f26b7a4ccbf395693ad089998eb038cb01f22a6b993f670f9bddeea676758440
-
SHA512
d6cb2f8f51fe9128d879b6ab06bb0fc0e505618adbf3678bcb849bac7a41f0c884b22046cc407a704894c6d5014b18790afbcb85e6a85d6b867de6f696ddd310
-
SSDEEP
196608:gVOdDM5sCiHyQJhgGOjf5fOXHlOHHSXmiRS6lwLJoQoG4wFq:gEdDMsCRQJhgDjBs2HeS6ynonwQ
Behavioral task
behavioral1
Sample
gen steam.roblox/License-.rtf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
gen steam.roblox/License-.rtf
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
gen steam.roblox/gen-(1).exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
gen steam.roblox/gen-(1).exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
gen steam.roblox/License-.rtf
-
Size
192B
-
MD5
048f563e590dcebfbd85bf3728df3791
-
SHA1
fe00a008f6d95dc14a84578045197d25c1f97616
-
SHA256
da1cd38070db8e4c12643ed6007be206c26392f47e8d5a898937f9379d2aae01
-
SHA512
47ed4377afe15774dc2ef327858f2f28a0f17ae1e68bddc57898fc4b3654e98402ea8bed5f63342fa9d6f6b227a2f7fd6ccd601e59f5ee6132b4c4d8830b6d0f
Score4/10 -
-
-
Target
gen steam.roblox/gen-(1).exe
-
Size
7.4MB
-
MD5
ccf3d3e9e629990d4dcfa3fec7f3ec1e
-
SHA1
479f853bf161ddff64a044b486d70e96654c923e
-
SHA256
f332235072e8ab37ec7c472f04e1d919be8a841cdc7bc3c3a19f1deb0ad2d700
-
SHA512
83a0458a3ebbf70b26e2e3324c836cc2b82748b2a17e195334b4a31a43ee0c35a288eb2e375cf440564ad9ba78f9d908ff178290354207a004ee98899776863d
-
SSDEEP
98304:wGSi8TR8WnurErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EwKhOh112mY:wBcgurErvI9pWjgfPvzm6gsFEF4fC
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Process Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1