Analysis
-
max time kernel
2s -
max time network
58s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
05/10/2024, 21:04
Static task
static1
1 signatures
General
-
Target
com-mod-roblox-mod-apk-menu-god-mode-jump-fly-teleport-map-hack-2-639-688-1668.apk
-
Size
132.8MB
-
MD5
2a22d8e9192703cd6f3770ca7d057cea
-
SHA1
64b2265013ec044a22e511fd368adc6819341621
-
SHA256
4175800d2bc9bef141b98bf0560acacc60c6ced44fe4abb331de9b23c983c974
-
SHA512
0fdd79a8727552f9e4733ade637753b8af82d740304c22cfe791b74a7c7715d862b0dccd0c0167a7fc69b06f7730b242fe3eea7fde0cbbc9b207f4ed5b61c295
-
SSDEEP
3145728:UU/fNcHNkQAslLYSq57U3C14ykEzrut5GLa6yxoQllDOvzGoAcN:UU9eNkYShNUP7Eut8La6ylDOPA0
Malware Config
Signatures
-
Checks Android system properties for emulator presence. 1 TTPs 3 IoCs
description ioc Process Accessed system property key: ro.product.name com.roblox.client Accessed system property key: ro.product.device com.roblox.client Accessed system property key: ro.bootloader com.roblox.client -
Checks Qemu related system properties. 1 TTPs 3 IoCs
Checks for Android system properties related to Qemu for Emulator detection.
description ioc Process Accessed system property key: ro.kernel.android.qemud com.roblox.client Accessed system property key: qemu.hw.mainkeys com.roblox.client Accessed system property key: qemu.sf.fake_camera com.roblox.client -
Reads information about phone network operator. 1 TTPs