General

  • Target

    Roblox.exe

  • Size

    17.0MB

  • MD5

    cdb735f997ef92e7abb6a2538043dda1

  • SHA1

    576d910e9b80ea127082353eb6418816e9f42e19

  • SHA256

    e4a8dc5c1d78a6721b7d3bd4678bd921d41f36618902a78e5634badaaa194fca

  • SHA512

    c315479c538688d5eaa2f57ee04f84eb51bba1d36dd63073c13c7f49e3ec2b53f3275b57d365128ba0c26a25046b7c91f17135581c6da782aee5ed0662141f44

  • SSDEEP

    393216:uQts9Y2pYDfDllpfaMPg5Rt81zd0zdCU:uQts9Y2abhHf9Pg5fGP

Malware Config

Signatures

  • An infostealer written in Python and packaged with PyInstaller. 1 IoCs
  • Crealstealer family
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Roblox.exe
    .exe windows:5 windows x64 arch:x64

    0b5552dccd9d0a834cea55c0c8fc05be


    Headers

    Imports

    Sections

  • Creal.pyc