General
-
Target
ROBLOX_Android_12_5_2016_realxtr4.apk
-
Size
52.5MB
-
Sample
240726-ze5pestbpm
-
MD5
fcfdfc19ac430661c5d676d6bafda1dd
-
SHA1
1febd41963829c937b10a4420ec0077d36e072e4
-
SHA256
1d73360b89e418b43e9c27791470bcfe6e0852ba8fce1d1ec38906135606e4c8
-
SHA512
e0fbf976f853a75d85173c5493db87282f6cb2e17fff05125d9ec4a4353cf6287b4dd7db66033bd94ba5abfa503f005341b7a47d31c710e5464608a3d91a430f
-
SSDEEP
1572864:BYy3eBEz9Y0MaI12joF9zJRzphrl90+Ff7dsbj:aBEJLMj13FBJRtH90+FDubj
Static task
static1
Behavioral task
behavioral1
Sample
ROBLOX_Android_12_5_2016_realxtr4.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral2
Sample
ROBLOX_Android_12_5_2016_realxtr4.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral3
Sample
ROBLOX_Android_12_5_2016_realxtr4.apk
Resource
android-33-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
ROBLOX_Android_12_5_2016_realxtr4.apk
-
Size
52.5MB
-
MD5
fcfdfc19ac430661c5d676d6bafda1dd
-
SHA1
1febd41963829c937b10a4420ec0077d36e072e4
-
SHA256
1d73360b89e418b43e9c27791470bcfe6e0852ba8fce1d1ec38906135606e4c8
-
SHA512
e0fbf976f853a75d85173c5493db87282f6cb2e17fff05125d9ec4a4353cf6287b4dd7db66033bd94ba5abfa503f005341b7a47d31c710e5464608a3d91a430f
-
SSDEEP
1572864:BYy3eBEz9Y0MaI12joF9zJRzphrl90+Ff7dsbj:aBEJLMj13FBJRtH90+FDubj
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Checks the presence of a debugger
-