General

  • Target

    https://github.com/FoRuxGaming/RobloxCheats/blob/main/%5BFoRux%20Gaming%5DLucidity%20Cheats.txt

  • Sample

    250212-ftvm8azkar

Malware Config

Targets

    • Target

      https://github.com/FoRuxGaming/RobloxCheats/blob/main/%5BFoRux%20Gaming%5DLucidity%20Cheats.txt

    • BadRabbit

      Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

    • Badrabbit family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Detected potential entity reuse from brand GOOGLE.

    • Detected potential entity reuse from brand MICROSOFT.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks