General
-
Target
Fortnite_v2.6.exe
-
Size
20.6MB
-
Sample
240204-h46vcaefcm
-
MD5
a47df15d5f604b0984b854665669b1ba
-
SHA1
a0a85963c4ce09cb5850775160cebd7f6ad24b3c
-
SHA256
64e3283ea372e533752a165b774e3d732f58ffe39cef258edf7d9e83695b88b0
-
SHA512
659031b47323b921f42615ead3be88356e9082d86cce83d0b0c01a34771810b699ca244979661a734efdef59cf57e0233d637685090b40c73f9c9a725fd32b71
-
SSDEEP
393216:gqPnLFXlrlSeqzbQpDOETgsvfGFw6Kg1vhevE4bGakwoDm:hPLFXNhabQoErI5Ubr
Behavioral task
behavioral1
Sample
Fortnite_v2.6.exe
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
main.pyc
Resource
win10-20231220-en
Malware Config
Targets
-
-
Target
Fortnite_v2.6.exe
-
Size
20.6MB
-
MD5
a47df15d5f604b0984b854665669b1ba
-
SHA1
a0a85963c4ce09cb5850775160cebd7f6ad24b3c
-
SHA256
64e3283ea372e533752a165b774e3d732f58ffe39cef258edf7d9e83695b88b0
-
SHA512
659031b47323b921f42615ead3be88356e9082d86cce83d0b0c01a34771810b699ca244979661a734efdef59cf57e0233d637685090b40c73f9c9a725fd32b71
-
SSDEEP
393216:gqPnLFXlrlSeqzbQpDOETgsvfGFw6Kg1vhevE4bGakwoDm:hPLFXNhabQoErI5Ubr
Score7/10-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
main.pyc
-
Size
7KB
-
MD5
a08357a74a671f6b6fc18b2132152a5f
-
SHA1
62d721670ca2413ee4ddffd525be097f00ffee4e
-
SHA256
68616606ed6deb5d3eb9a30e8912f11593cae6271276c8b44a0addb9eafbb660
-
SHA512
a0dfd5c05a7a5fbbf0427b587133be93080acd9c167b5e61b2b32b9bc574c8fdbe9def1e8b83d48d9d88384d47c631866667b220181dfcf2f646cf680335eead
-
SSDEEP
192:wYhjFD8DtIWdXwskwGSjVDJhwW/NXgMdwjSuCJnw:HAIWusku32OXgPjS5w
Score3/10 -