General

  • Target

    Roblox.exe

  • Size

    17.0MB

  • Sample

    241230-e11mdayjam

  • MD5

    cdb735f997ef92e7abb6a2538043dda1

  • SHA1

    576d910e9b80ea127082353eb6418816e9f42e19

  • SHA256

    e4a8dc5c1d78a6721b7d3bd4678bd921d41f36618902a78e5634badaaa194fca

  • SHA512

    c315479c538688d5eaa2f57ee04f84eb51bba1d36dd63073c13c7f49e3ec2b53f3275b57d365128ba0c26a25046b7c91f17135581c6da782aee5ed0662141f44

  • SSDEEP

    393216:uQts9Y2pYDfDllpfaMPg5Rt81zd0zdCU:uQts9Y2abhHf9Pg5fGP

Malware Config

Targets

    • Target

      Roblox.exe

    • Size

      17.0MB

    • MD5

      cdb735f997ef92e7abb6a2538043dda1

    • SHA1

      576d910e9b80ea127082353eb6418816e9f42e19

    • SHA256

      e4a8dc5c1d78a6721b7d3bd4678bd921d41f36618902a78e5634badaaa194fca

    • SHA512

      c315479c538688d5eaa2f57ee04f84eb51bba1d36dd63073c13c7f49e3ec2b53f3275b57d365128ba0c26a25046b7c91f17135581c6da782aee5ed0662141f44

    • SSDEEP

      393216:uQts9Y2pYDfDllpfaMPg5Rt81zd0zdCU:uQts9Y2abhHf9Pg5fGP

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks