Analysis
-
max time kernel
25s -
max time network
44s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
20-12-2023 10:43
Behavioral task
behavioral1
Sample
FortniteCracker/Extreme.Net.dll
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
FortniteCracker/FortniteCracker.exe
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
FortniteCracker/Newtonsoft.Json.dll
Resource
win10-20231215-en
Behavioral task
behavioral4
Sample
FortniteCracker/Ookii.Dialogs.Wpf.dll
Resource
win10-20231215-en
Behavioral task
behavioral5
Sample
FortniteCracker/RandomUserAgent.dll
Resource
win10-20231215-en
Behavioral task
behavioral6
Sample
FortniteCracker/ReadMe.txt
Resource
win10-20231215-en
General
-
Target
FortniteCracker/ReadMe.txt
-
Size
72B
-
MD5
cc52ee954c5199bd06a0a12bd1787467
-
SHA1
5d444334db33b058d2b745ff409d8db1fa384ff6
-
SHA256
8e74c21c0bfc5295b3e9aba70238f15db6bfc9ab11dd2ec961811d48d3c276e8
-
SHA512
812df93e8860a93ab1f8f72079f2db8196029c1d2fa6f8413ecd1b6734b703f3bbba21e5e47d3ec725e6d1a121e0abb5886f19002fa5f258c8bb8f1f0a696ae6
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4968 NOTEPAD.EXE