General

  • Target

    Fortnite Hack.exe

  • Size

    1.2MB

  • Sample

    220728-xxmkfsadc6

  • MD5

    55b26a60484194685f548c1c9fd4a688

  • SHA1

    13f143a185813088b5f504b0ea0062ba8f4d414e

  • SHA256

    847cdb293e5ebd178f6a96bf6ab1d42a19a8e1fe7f95cd7858e6c06f9383fa3c

  • SHA512

    56d1f66f0cf9aaa5b59443708a4e6924f6c9719f78a672f871c1ec03509a89d219fa65e36078752c493b18849003ff24fffe0fadc0462147bcc0b915ef2a4494

Malware Config

Extracted

Family

redline

C2

62.204.41.141:24758

Attributes
  • auth_value

    b60ab0a77cd51a54dec9018aa7c54ea1

Targets

    • Target

      Fortnite Hack.exe

    • Size

      1.2MB

    • MD5

      55b26a60484194685f548c1c9fd4a688

    • SHA1

      13f143a185813088b5f504b0ea0062ba8f4d414e

    • SHA256

      847cdb293e5ebd178f6a96bf6ab1d42a19a8e1fe7f95cd7858e6c06f9383fa3c

    • SHA512

      56d1f66f0cf9aaa5b59443708a4e6924f6c9719f78a672f871c1ec03509a89d219fa65e36078752c493b18849003ff24fffe0fadc0462147bcc0b915ef2a4494

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks