Malware Analysis Report

2025-08-10 12:02

Sample ID 240505-nzm5bshb4w
Target RobloxPlayerInstaller.exe
SHA256 e74d896bc3469b5a28eb5a04ea364a9ab32737d573868fb08a327820ea624c04
Tags
score
1/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
1/10

SHA256

e74d896bc3469b5a28eb5a04ea364a9ab32737d573868fb08a327820ea624c04

Threat Level: No (potentially) malicious behavior was detected

The file RobloxPlayerInstaller.exe was found to be: No (potentially) malicious behavior was detected.

Malicious Activity Summary

N/A

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-05-05 11:50

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-05 11:50

Reported

2024-05-05 11:50

Platform

android-33-x64-arm64-20240229-en

Max time network

6s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
GB 172.217.16.228:443 udp
GB 172.217.16.228:443 tcp
GB 172.217.16.228:443 tcp
BE 64.233.166.188:5228 tcp
GB 142.250.200.36:443 tcp
N/A 224.0.0.251:5353 udp
GB 142.250.200.36:443 tcp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-05 11:50

Reported

2024-05-05 11:50

Platform

ubuntu2004-amd64-20240418-en

Max time kernel

0s

Max time network

2s

Command Line

[/tmp/RobloxPlayerInstaller.exe]

Signatures

N/A

Processes

/tmp/RobloxPlayerInstaller.exe

[/tmp/RobloxPlayerInstaller.exe]

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 cdn.fwupd.org udp
US 1.1.1.1:53 cdn.fwupd.org udp
US 151.101.194.49:443 cdn.fwupd.org tcp

Files

N/A