Static task
static1
Behavioral task
behavioral1
Sample
BlitzWare_Fortnite_Menu/BlitzWare.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
BlitzWare_Fortnite_Menu/BlitzWare.exe
Resource
win10v2004-20231215-en
General
-
Target
BlitzWare_Fortnite_Menu.zip
-
Size
11.6MB
-
MD5
3aff50de39675f2d8e5f47ca1f467e00
-
SHA1
f2ceb18d59b1f71175c93f880db2e4748c1b6f09
-
SHA256
5a52085a5f8f591347e11bc4c9246887ebe5dcde0209edc7016e3d6000f1defa
-
SHA512
0d67de715e17c777b8d129f14ade87094cdc0872e9f022e7097b973d108c0ee4ab43a0aa26b5c363add53dc23e0f0e3bde6f4f907324c6180475b09dee3a5945
-
SSDEEP
196608:45Wbi6lFv7YDR1TDfoSeYaAZ9gL/zhgCkr3tXqeMi4AbfUWgFVZ5:4Ai6TUDR1Wvh2r3tXquvbfGFVZ5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/BlitzWare_Fortnite_Menu/BlitzWare.exe
Files
-
BlitzWare_Fortnite_Menu.zip.zip
Password: 2023
-
BlitzWare_Fortnite_Menu/BlitzWare.exe.exe windows:4 windows x86 arch:x86
Password: 2023
6f462fcc6b830b77fb3fef2add9dc570
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
msvcrt
malloc
_sleep
memset
strcmp
strcpy
getenv
sprintf
fopen
fwrite
fclose
__argc
__argv
_environ
_XcptFilter
__set_app_type
_controlfp
__getmainargs
exit
shell32
ShellExecuteA
kernel32
SetUnhandledExceptionFilter
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12.5MB - Virtual size: 12.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 266KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ