Analysis
-
max time kernel
118s -
max time network
148s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
24-10-2021 18:00
Static task
static1
Behavioral task
behavioral1
Sample
cheatfortnite.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
cheatfortnite.exe
Resource
win10-en-20210920
General
-
Target
cheatfortnite.exe
-
Size
1.1MB
-
MD5
c0e9935cb4cb60cdb175b61bba7e01d6
-
SHA1
300d9cf6dba00343e14a4c799baf21e086173add
-
SHA256
687ffc4482b61c06eee3734a10d0702440faac50f61b85197082e17ab8ce3b86
-
SHA512
ab7b3149cbafaf8620d6e05d4150664eb3590e212caed89cec4ee506bf78c4c9582ba8b441bc4e470548c397b47be51a8e3580511f3c750506c80c4a1dbab2a1
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
cheatfortnite.exepid process 1764 cheatfortnite.exe 1764 cheatfortnite.exe 1764 cheatfortnite.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
cheatfortnite.exepid process 1764 cheatfortnite.exe 1764 cheatfortnite.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
cheatfortnite.exedescription pid process Token: SeDebugPrivilege 1764 cheatfortnite.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
cheatfortnite.exepid process 1764 cheatfortnite.exe