General

  • Target

    ROBLOX_Android_12_5_2016_realxtr4.apk

  • Size

    52.5MB

  • Sample

    240726-ze5pestbpm

  • MD5

    fcfdfc19ac430661c5d676d6bafda1dd

  • SHA1

    1febd41963829c937b10a4420ec0077d36e072e4

  • SHA256

    1d73360b89e418b43e9c27791470bcfe6e0852ba8fce1d1ec38906135606e4c8

  • SHA512

    e0fbf976f853a75d85173c5493db87282f6cb2e17fff05125d9ec4a4353cf6287b4dd7db66033bd94ba5abfa503f005341b7a47d31c710e5464608a3d91a430f

  • SSDEEP

    1572864:BYy3eBEz9Y0MaI12joF9zJRzphrl90+Ff7dsbj:aBEJLMj13FBJRtH90+FDubj

Malware Config

Targets

    • Target

      ROBLOX_Android_12_5_2016_realxtr4.apk

    • Size

      52.5MB

    • MD5

      fcfdfc19ac430661c5d676d6bafda1dd

    • SHA1

      1febd41963829c937b10a4420ec0077d36e072e4

    • SHA256

      1d73360b89e418b43e9c27791470bcfe6e0852ba8fce1d1ec38906135606e4c8

    • SHA512

      e0fbf976f853a75d85173c5493db87282f6cb2e17fff05125d9ec4a4353cf6287b4dd7db66033bd94ba5abfa503f005341b7a47d31c710e5464608a3d91a430f

    • SSDEEP

      1572864:BYy3eBEz9Y0MaI12joF9zJRzphrl90+Ff7dsbj:aBEJLMj13FBJRtH90+FDubj

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks