Analysis
-
max time kernel
56s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
15-04-2022 06:54
Static task
static1
Behavioral task
behavioral1
Sample
Fortnite CFFHOOK by Spyro.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Fortnite CFFHOOK by Spyro.exe
Resource
win10v2004-20220414-en
General
-
Target
Fortnite CFFHOOK by Spyro.exe
-
Size
1.8MB
-
MD5
bc9b1b368097805254280adc0ebab47e
-
SHA1
d74790b312152fbc6d74f004bef26227c2f1e6aa
-
SHA256
3c301ea2f7c6113f5a27f95f694e84c2506aa18ff533ce1583263abace106266
-
SHA512
42182971c99e02a081daaece870984bdd9bc3b902cbb4c99c393fc1240bfffa99a61964dc371c227e13705b1cb52be087fced0f157c8960d8e871f8f9f11dfaf
Malware Config
Extracted
redline
crpt
65.108.20.114:3074
-
auth_value
85833779d67675e04a9bce1ac53a9870
Signatures
-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
resource yara_rule behavioral2/memory/2188-133-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2192 set thread context of 2188 2192 Fortnite CFFHOOK by Spyro.exe 78 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2188 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2188 AppLaunch.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2188 2192 Fortnite CFFHOOK by Spyro.exe 78 PID 2192 wrote to memory of 2188 2192 Fortnite CFFHOOK by Spyro.exe 78 PID 2192 wrote to memory of 2188 2192 Fortnite CFFHOOK by Spyro.exe 78 PID 2192 wrote to memory of 2188 2192 Fortnite CFFHOOK by Spyro.exe 78 PID 2192 wrote to memory of 2188 2192 Fortnite CFFHOOK by Spyro.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fortnite CFFHOOK by Spyro.exe"C:\Users\Admin\AppData\Local\Temp\Fortnite CFFHOOK by Spyro.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188
-