General

  • Target

    RobloxAccountGenerator0.2.0.exe

  • Size

    30.1MB

  • Sample

    250115-3gwq3szlgy

  • MD5

    30edb89722561686be670720ed8bc0a4

  • SHA1

    baf454066e443a043660cb1f9905516d2af24426

  • SHA256

    602c7c113606ffab77259fdafc1562f741ec71d8634d5603b89b2210e59b3183

  • SHA512

    65932e4578d430df03462af8df89d0aa02d48ba63ad7ef8668ab808a10e7c069a6275e5a14caa3166c3c27a8b3bd099573e3b8de90b92a69f20d7890e5db02b1

  • SSDEEP

    786432:NZzV22dImgI0hW+e5RJ9M/UFi7H+tAW7TK5qW80hOj5:NZzV2eihW+eHY/UcqtrTKcW7g

Malware Config

Targets

    • Target

      RobloxAccountGenerator0.2.0.exe

    • Size

      30.1MB

    • MD5

      30edb89722561686be670720ed8bc0a4

    • SHA1

      baf454066e443a043660cb1f9905516d2af24426

    • SHA256

      602c7c113606ffab77259fdafc1562f741ec71d8634d5603b89b2210e59b3183

    • SHA512

      65932e4578d430df03462af8df89d0aa02d48ba63ad7ef8668ab808a10e7c069a6275e5a14caa3166c3c27a8b3bd099573e3b8de90b92a69f20d7890e5db02b1

    • SSDEEP

      786432:NZzV22dImgI0hW+e5RJ9M/UFi7H+tAW7TK5qW80hOj5:NZzV2eihW+eHY/UcqtrTKcW7g

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks