File name:

Roblox Executor.exe

Full analysis: https://app.any.run/tasks/aaa4b5de-0466-456c-8289-51467add521d
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: February 08, 2025, 13:16:25
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
discord
exfiltration
stealer
evasion
discordrat
ims-api
generic
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 2 sections
MD5:

E1BAB150D7C683D7A5C99867261245D5

SHA1:

1B06CA2B1E4956561378903601410DA4158E64E0

SHA256:

2B870FEF35CC324B67B96B15765EB557D390B3D3B49D56C05964734D64EB65AF

SSDEEP:

1536:CWvujCuQECZ2Mxb78WwbjVxCahfoKV6+V+k2if:mZQrH/wbjJ6E+Fif

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • DISCORDRAT has been detected (YARA)

      • Roblox Executor.exe (PID: 2072)
    • Changes the autorun value in the registry

      • Roblox Executor.exe (PID: 2072)
  • SUSPICIOUS

    • Checks for external IP

      • Roblox Executor.exe (PID: 2072)
    • The process connected to a server suspected of theft

      • Roblox Executor.exe (PID: 2072)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • Roblox Executor.exe (PID: 2072)
  • INFO

    • Disables trace logs

      • Roblox Executor.exe (PID: 2072)
    • Checks supported languages

      • Roblox Executor.exe (PID: 2072)
    • Checks proxy server information

      • Roblox Executor.exe (PID: 2072)
    • Reads the computer name

      • Roblox Executor.exe (PID: 2072)
    • Reads the machine GUID from the registry

      • Roblox Executor.exe (PID: 2072)
    • Reads Environment values

      • Roblox Executor.exe (PID: 2072)
    • Reads the software policy settings

      • Roblox Executor.exe (PID: 2072)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2084:03:20 18:56:28+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 48
CodeSize: 78336
InitializedDataSize: 1536
UninitializedDataSize: -
EntryPoint: 0x0000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: Discord rat
FileVersion: 1.0.0.0
InternalName: Discord rat.exe
LegalCopyright: Copyright © 2022
LegalTrademarks: -
OriginalFileName: Discord rat.exe
ProductName: Discord rat
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
1
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #DISCORDRAT roblox executor.exe

Process information

PID
CMD
Path
Indicators
Parent process
2072"C:\Users\admin\AppData\Local\Temp\Roblox Executor.exe" C:\Users\admin\AppData\Local\Temp\Roblox Executor.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Discord rat
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\roblox executor.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
938
Read events
923
Write events
15
Delete events
0

Modification events

(PID) Process:(2072) Roblox Executor.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Roblox Executor_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2072) Roblox Executor.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Roblox Executor_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2072) Roblox Executor.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Roblox Executor_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2072) Roblox Executor.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Roblox Executor_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2072) Roblox Executor.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Roblox Executor_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(2072) Roblox Executor.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Roblox Executor_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2072) Roblox Executor.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Roblox Executor_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2072) Roblox Executor.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Roblox Executor_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2072) Roblox Executor.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Roblox Executor_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2072) Roblox Executor.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Roblox Executor_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
36
DNS requests
16
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5064
SearchApp.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6376
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6200
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6376
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.16.110.193:443
www.bing.com
Akamai International B.V.
DE
whitelisted
2072
Roblox Executor.exe
162.159.135.234:443
gateway.discord.gg
CLOUDFLARENET
whitelisted
2072
Roblox Executor.exe
162.159.137.232:443
discord.com
CLOUDFLARENET
whitelisted
2072
Roblox Executor.exe
159.89.102.253:443
geolocation-db.com
DIGITALOCEAN-ASN
DE
whitelisted
1076
svchost.exe
23.213.166.81:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
20.190.160.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 2.16.110.193
  • 2.16.110.131
  • 2.16.110.184
  • 2.16.110.145
  • 2.16.110.170
  • 2.16.110.177
  • 2.16.110.168
  • 2.16.110.195
  • 2.16.110.147
whitelisted
gateway.discord.gg
  • 162.159.135.234
  • 162.159.130.234
  • 162.159.134.234
  • 162.159.133.234
  • 162.159.136.234
whitelisted
discord.com
  • 162.159.137.232
  • 162.159.135.232
  • 162.159.136.232
  • 162.159.128.233
  • 162.159.138.232
whitelisted
geolocation-db.com
  • 159.89.102.253
whitelisted
go.microsoft.com
  • 23.213.166.81
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
login.live.com
  • 20.190.160.2
  • 20.190.160.130
  • 20.190.160.131
  • 40.126.32.136
  • 20.190.160.5
  • 20.190.160.14
  • 20.190.160.65
  • 20.190.160.17
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
arc.msn.com
  • 20.74.47.205
whitelisted
fd.api.iris.microsoft.com
  • 20.223.36.55
whitelisted

Threats

PID
Process
Class
Message
2192
svchost.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
2072
Roblox Executor.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
2192
svchost.exe
Misc activity
ET INFO External IP Lookup Domain in DNS Lookup (geolocation-db .com)
2072
Roblox Executor.exe
Misc activity
ET INFO External IP Lookup Domain (geolocation-db .com) in TLS SNI
2072
Roblox Executor.exe
Successful Credential Theft Detected
STEALER [ANY.RUN] Attempt to exfiltrate via Discord
2072
Roblox Executor.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
2072
Roblox Executor.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
2072
Roblox Executor.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
2072
Roblox Executor.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
2072
Roblox Executor.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
No debug info