Static task
static1
Behavioral task
behavioral1
Sample
New Fortnite Hack.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
New Fortnite Hack.exe
Resource
win10v2004-20220901-en
General
-
Target
New Fortnite Hack.exe
-
Size
277KB
-
MD5
d62e307cd1a5321721aa955268f96b8f
-
SHA1
321f0fdf13f9ed9cff4fe990738ae725bddacd41
-
SHA256
bf3166483b1641af9c25f6325d540063ca70deb2866b819e4d14d271a79993e4
-
SHA512
2a33ffc880193e34f90b6c6c8b52c73c8da8947873178f5c09aded32ac4678fd5ad47df7db0467da3b9cc90f120084bc8bbbfcad302131c5f523d3cf63834e95
-
SSDEEP
6144:mGSuuTqtk+aUooj2culI/uix7xiwbIe4XqLMl/:7ucOurGixjMe4XqLMZ
Malware Config
Signatures
Files
-
New Fortnite Hack.exe.exe windows x86
99ac4776dffc86e6228b941969ebdcf3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
InvalidateRect
GetSysColorBrush
FindWindowA
GetSystemMetrics
GetDlgItem
SendDlgItemMessageA
AppendMenuA
CreatePopupMenu
DestroyMenu
ClientToScreen
TrackPopupMenu
GetCursorPos
SendMessageA
GetDlgItemTextA
wsprintfA
MessageBoxA
LoadCursorA
GetActiveWindow
CheckDlgButton
SetWindowTextA
IsDlgButtonChecked
SetWindowLongA
CallWindowProcA
GetClassInfoA
CloseClipboard
GetClipboardData
EnumClipboardFormats
SetDlgItemTextA
EndDialog
RegisterClassA
DefDlgProcA
SetActiveWindow
SetMenuItemInfoA
CheckMenuItem
GetMenu
InsertMenuItemA
SetWindowPlacement
SetTimer
GetSystemMenu
MoveWindow
GetClientRect
PostQuitMessage
DestroyWindow
DestroyIcon
KillTimer
GetSysColor
CheckMenuRadioItem
EnableMenuItem
CharLowerBuffA
GetWindowPlacement
SetDlgItemInt
GetSubMenu
IsMenu
GetWindowRect
CreateDialogParamA
DestroyCursor
PostMessageA
ChildWindowFromPoint
RemoveMenu
kernel32
GetStartupInfoW
WriteConsoleW
CloseHandle
CreateFileW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
HeapReAlloc
HeapSize
GetProcessHeap
LCMapStringW
CompareStringW
GetStringTypeW
GetFileType
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapFree
HeapAlloc
GetCommandLineW
GetCommandLineA
GetModuleHandleExW
ExitProcess
GetModuleFileNameW
WriteFile
GetStdHandle
RaiseException
EncodePointer
LoadLibraryExW
FreeLibrary
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
GetModuleHandleA
GetProcAddress
FreeConsole
GetCurrentThreadId
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DecodePointer
IsProcessorFeaturePresent
GetModuleHandleW
GetCurrentProcess
TerminateProcess
EnterCriticalSection
RtlUnwind
GetLastError
SetLastError
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 179KB - Virtual size: 181KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ