Analysis

  • max time kernel
    2s
  • max time network
    58s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    05/10/2024, 21:04

General

  • Target

    com-mod-roblox-mod-apk-menu-god-mode-jump-fly-teleport-map-hack-2-639-688-1668.apk

  • Size

    132.8MB

  • MD5

    2a22d8e9192703cd6f3770ca7d057cea

  • SHA1

    64b2265013ec044a22e511fd368adc6819341621

  • SHA256

    4175800d2bc9bef141b98bf0560acacc60c6ced44fe4abb331de9b23c983c974

  • SHA512

    0fdd79a8727552f9e4733ade637753b8af82d740304c22cfe791b74a7c7715d862b0dccd0c0167a7fc69b06f7730b242fe3eea7fde0cbbc9b207f4ed5b61c295

  • SSDEEP

    3145728:UU/fNcHNkQAslLYSq57U3C14ykEzrut5GLa6yxoQllDOvzGoAcN:UU9eNkYShNUP7Eut8La6ylDOPA0

Score
7/10

Malware Config

Signatures

  • Checks Android system properties for emulator presence. 1 TTPs 3 IoCs
  • Checks Qemu related system properties. 1 TTPs 3 IoCs

    Checks for Android system properties related to Qemu for Emulator detection.

  • Reads information about phone network operator. 1 TTPs

Processes

  • com.roblox.client
    1⤵
    • Checks Android system properties for emulator presence.
    • Checks Qemu related system properties.
    PID:4372

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads