Static task
static1
Behavioral task
behavioral1
Sample
Fortnite_CHEAT_CRACKED.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Fortnite_CHEAT_CRACKED.exe
Resource
win10v2004-20230831-en
General
-
Target
Fortnite_CHEAT_CRACKED.exe
-
Size
4.4MB
-
MD5
ced6b4527a3f34f3c41f64326e5ed855
-
SHA1
fbc58ca9210f0cae4271ef28d14f66dadf073bf8
-
SHA256
00ee54378e6756b246a4c783d17f04a8c80782cba56b3721e9806173bb14cbed
-
SHA512
8189a8fcfda20a5195a75b4f6ea9ffcb92f7b7e6198c738f3a4d5908d5470d69d15f77919da13705b03b473b182c7d20db68861254046827ca88f00b2f7e3005
-
SSDEEP
98304:JpboyaGFmzStgEVRi4fEkZdulDMeF6UugCwrzE/2SMb/4K:JpoypFmzenHzfEGU6/dE4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Fortnite_CHEAT_CRACKED.exe
Files
-
Fortnite_CHEAT_CRACKED.exe.exe windows x86
baa93d47220682c04d92f7797d9224ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpy
comctl32
InitCommonControls
Sections
Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kqoijjzc Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vxxsbhxa Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE