C:\buildAgent\work\ci_deploy_ninja_boot-x86_git\build.ninja\common\vs2019\x86\release\Installer\Windows\RobloxPlayerInstaller.pdb
Static task
static1
General
-
Target
2024-12-01_1990c5c7fb271c3642fffcc718332a66_hijackloader_luca-stealer_magniber
-
Size
6.7MB
-
MD5
1990c5c7fb271c3642fffcc718332a66
-
SHA1
96772cec65af281b67ba770838b354f02fc4acaf
-
SHA256
e5506f1442e9d76f61dff5b158caa4cbbe942cd9e27dc378d31eefce4d11c59c
-
SHA512
ebf369d5450ac352fe2d21b2ba58acde3e0c3572354d5aee7176289be255278cb3ef0808da4d21443ad80165b19480642e3539a1b7ffc039c5a61d609ef6adf3
-
SSDEEP
98304:q0vhWhkxBW2oqIht3aMQPfb6Fw04X1xEg+CNlPSHtzQLy9rF:ZKkxBW/qgkvFX1xEyP8zQG9r
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-12-01_1990c5c7fb271c3642fffcc718332a66_hijackloader_luca-stealer_magniber
Files
-
2024-12-01_1990c5c7fb271c3642fffcc718332a66_hijackloader_luca-stealer_magniber.exe windows:6 windows x86 arch:x86
a1bf1501469462941a8b8e231056e07a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
comctl32
_TrackMouseEvent
InitCommonControlsEx
gdiplus
GdiplusShutdown
GdipCloneImage
GdiplusStartup
GdipCreateHBITMAPFromBitmap
GdipDisposeImage
GdipCreateBitmapFromStream
GdipAlloc
GdipFree
wininet
InternetOpenW
HttpOpenRequestW
InternetConnectW
InternetReadFile
InternetQueryDataAvailable
InternetQueryOptionW
InternetSetStatusCallbackW
InternetCloseHandle
HttpAddRequestHeadersW
HttpSendRequestW
HttpQueryInfoW
shell32
ShellExecuteExW
SHGetKnownFolderPath
Shell_NotifyIconW
SHGetFolderPathAndSubDirW
iphlpapi
GetAdaptersAddresses
ws2_32
freeaddrinfo
getaddrinfo
recv
listen
ioctlsocket
connect
bind
accept
select
__WSAFDIsSet
WSAIoctl
setsockopt
WSACleanup
WSAStartup
inet_pton
WSAGetLastError
WSASetLastError
closesocket
WSACreateEvent
WSACloseEvent
send
getsockopt
htons
htonl
inet_ntop
socket
ntohs
ntohl
gethostname
getnameinfo
getsockname
bcrypt
BCryptGenRandom
advapi32
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
GetUserNameW
CryptDestroyHash
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegGetValueW
RegOpenKeyExA
RegQueryValueExA
CryptDestroyKey
SystemFunction036
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptSignHashW
CryptEnumProvidersW
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegDeleteTreeW
OpenProcessToken
AllocateAndInitializeSid
CopySid
EqualSid
FreeSid
GetLengthSid
GetTokenInformation
IsValidSid
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertGetEnhancedKeyUsage
CertGetIntendedKeyUsage
CertOpenSystemStoreA
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertFindCertificateInStore
CertOpenStore
CertFreeCertificateContext
kernel32
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
GetExitCodeThread
InitOnceBeginInitialize
InitOnceComplete
InitializeConditionVariable
EncodePointer
LCMapStringEx
GetCPInfo
GetLocaleInfoEx
GetStringTypeW
IsProcessorFeaturePresent
InitializeSListHead
UnhandledExceptionFilter
GetStartupInfoW
InitializeSRWLock
RtlUnwind
InterlockedPushEntrySList
GetCommandLineA
CreateThread
WakeConditionVariable
IsDebuggerPresent
DebugBreak
OutputDebugStringW
CloseHandle
GetLastError
SetLastError
HeapAlloc
HeapFree
GetProcessHeap
ReleaseSemaphore
ReleaseMutex
WaitForSingleObject
WaitForSingleObjectEx
OpenSemaphoreW
CreateMutexExW
CreateSemaphoreExW
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
FormatMessageW
SetSearchPathMode
GetCommandLineW
VerSetConditionMask
GetDiskFreeSpaceExW
CreateMutexW
TerminateProcess
OpenProcess
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
VerifyVersionInfoW
MulDiv
LocaleNameToLCID
GetUserDefaultLocaleName
SetWaitableTimer
CancelWaitableTimer
CreateWaitableTimerW
Sleep
FindClose
FindFirstFileW
FindNextFileW
SetUnhandledExceptionFilter
SetEvent
CreateEventW
OpenEventW
ExitThread
CreateProcessW
GetSystemTime
CreateFileW
GetFileSize
DeleteFileW
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
GetModuleFileNameW
SystemTimeToFileTime
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
K32GetModuleFileNameExW
GetCurrentProcess
GetCurrentProcessorNumber
GlobalMemoryStatusEx
GetSystemInfo
GetSystemTimeAsFileTime
GetVersionExA
IsWow64Process
LoadLibraryA
K32GetProcessMemoryInfo
ResetEvent
CreateEventA
CreateSemaphoreA
DuplicateHandle
GetModuleHandleA
GetTickCount
OutputDebugStringA
QueryPerformanceCounter
QueryPerformanceFrequency
SwitchToThread
MultiByteToWideChar
WideCharToMultiByte
GetNativeSystemInfo
LoadLibraryExW
FileTimeToSystemTime
DecodePointer
RaiseException
InitializeCriticalSectionEx
DeleteCriticalSection
VirtualQuery
GetCurrentThread
LoadLibraryW
WaitForMultipleObjectsEx
LocalAlloc
LocalFree
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
CreateDirectoryW
GetFileAttributesW
GetFileSizeEx
ReadFile
RemoveDirectoryW
SetFileAttributesW
WriteFile
CopyFileW
GlobalAlloc
GlobalFree
GlobalUnlock
GlobalLock
CompareStringEx
FreeLibrary
GetEnvironmentVariableW
FlushFileBuffers
FormatMessageA
LockFileEx
CreateFileMappingA
UnlockFile
HeapDestroy
HeapCompact
HeapReAlloc
DeleteFileA
CreateFileA
FlushViewOfFile
GetFileAttributesExW
GetFileAttributesA
GetDiskFreeSpaceA
GetTempPathA
HeapSize
HeapValidate
GetVersionExW
GetTempPathW
UnlockFileEx
SetEndOfFile
GetFullPathNameA
SetFilePointer
LockFile
GetDiskFreeSpaceW
GetFullPathNameW
HeapCreate
AreFileApisANSI
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryA
MoveFileExA
CompareFileTime
GetEnvironmentVariableA
SleepEx
VirtualAlloc
VirtualProtect
VirtualFree
ReleaseSRWLockShared
AcquireSRWLockShared
ResumeThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateWaitableTimerA
GetCurrentDirectoryW
GetFileInformationByHandle
GetFileTime
SetFilePointerEx
SetFileTime
DeviceIoControl
MoveFileExW
InitializeCriticalSection
WriteConsoleW
GetStdHandle
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
SwitchToFiber
DeleteFiber
CreateFiber
GetFileType
ConvertFiberToThread
ConvertThreadToFiber
FreeLibraryAndExitThread
GetConsoleOutputCP
SetStdHandle
GetDriveTypeW
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
SetConsoleCtrlHandler
ExitProcess
GetTimeZoneInformation
TryEnterCriticalSection
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetFinalPathNameByHandleW
GetExitCodeProcess
user32
MapWindowPoints
GetWindowRect
InvalidateRect
EndPaint
BeginPaint
GetDC
DrawTextW
GetSystemMetrics
EnableWindow
EnumDisplayDevicesA
SetTimer
GetWindowLongW
GetDlgItem
ShowWindow
SetWindowLongW
GetParent
LoadIconW
DestroyIcon
GetWindowThreadProcessId
MessageBoxW
SendMessageW
DefWindowProcW
GetShellWindow
TranslateAcceleratorW
LoadAcceleratorsW
DispatchMessageW
TranslateMessage
GetUserObjectInformationW
GetProcessWindowStation
LoadBitmapW
GetDlgCtrlID
PostQuitMessage
CallWindowProcW
RegisterClassW
CreateWindowExW
GetMessageW
KillTimer
DestroyWindow
gdi32
SetBkMode
SetDCPenColor
BitBlt
SelectObject
RoundRect
GetStockObject
GetDeviceCaps
DeleteObject
DeleteDC
CreateSolidBrush
CreatePatternBrush
CreateFontW
CreateCompatibleDC
CreateCompatibleBitmap
SetTextColor
SetDCBrushColor
ole32
CoInitializeEx
CoTaskMemAlloc
CoUninitialize
CoInitialize
CoTaskMemFree
CoCreateGuid
CoCreateInstance
StringFromGUID2
shlwapi
PathFindFileNameW
PathFindExtensionW
ord12
powrprof
CallNtPowerInformation
winmm
timeGetDevCaps
timeSetEvent
timeBeginPeriod
timeGetTime
Sections
.text Size: 4.3MB - Virtual size: 4.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 793KB - Virtual size: 8.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 453KB - Virtual size: 452KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 189KB - Virtual size: 189KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.zero Size: 4KB - Virtual size: 3KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ