General
-
Target
Roblox.exe
-
Size
17.0MB
-
Sample
241230-e2zrgaxrhy
-
MD5
cdb735f997ef92e7abb6a2538043dda1
-
SHA1
576d910e9b80ea127082353eb6418816e9f42e19
-
SHA256
e4a8dc5c1d78a6721b7d3bd4678bd921d41f36618902a78e5634badaaa194fca
-
SHA512
c315479c538688d5eaa2f57ee04f84eb51bba1d36dd63073c13c7f49e3ec2b53f3275b57d365128ba0c26a25046b7c91f17135581c6da782aee5ed0662141f44
-
SSDEEP
393216:uQts9Y2pYDfDllpfaMPg5Rt81zd0zdCU:uQts9Y2abhHf9Pg5fGP
Behavioral task
behavioral1
Sample
Roblox.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Roblox.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Roblox.exe
-
Size
17.0MB
-
MD5
cdb735f997ef92e7abb6a2538043dda1
-
SHA1
576d910e9b80ea127082353eb6418816e9f42e19
-
SHA256
e4a8dc5c1d78a6721b7d3bd4678bd921d41f36618902a78e5634badaaa194fca
-
SHA512
c315479c538688d5eaa2f57ee04f84eb51bba1d36dd63073c13c7f49e3ec2b53f3275b57d365128ba0c26a25046b7c91f17135581c6da782aee5ed0662141f44
-
SSDEEP
393216:uQts9Y2pYDfDllpfaMPg5Rt81zd0zdCU:uQts9Y2abhHf9Pg5fGP
Score7/10-
Drops startup file
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-