Overview
overview
10Static
static
1fortnitepy...er.zip
windows10-2004-x64
1fortnitepy...ignore
windows10-2004-x64
3fortnitepy...ES.bat
windows10-2004-x64
10fortnitepy...ICENSE
windows10-2004-x64
1fortnitepy...DME.md
windows10-2004-x64
3fortnitepy...OT.bat
windows10-2004-x64
10fortnitepy...g.json
windows10-2004-x64
3fortnitepy...s.json
windows10-2004-x64
3fortnitepy...ite.py
windows10-2004-x64
3fortnitepy...t__.py
windows10-2004-x64
3fortnitepy...bot.py
windows10-2004-x64
3fortnitepy...ent.py
windows10-2004-x64
3fortnitepy...tic.py
windows10-2004-x64
3fortnitepy...ths.py
windows10-2004-x64
3fortnitepy...ors.py
windows10-2004-x64
3fortnitepy...tor.py
windows10-2004-x64
3fortnitepy...per.py
windows10-2004-x64
3fortnitepy...rty.py
windows10-2004-x64
3fortnitepy...ngs.py
windows10-2004-x64
3fortnitepy...ts.txt
windows10-2004-x64
1Analysis
-
max time kernel
1341s -
max time network
1194s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-02-2024 14:59
Static task
static1
Behavioral task
behavioral1
Sample
fortnitepy-bot-master.zip
Resource
win10v2004-20240221-en
Behavioral task
behavioral2
Sample
fortnitepy-bot-master/.gitignore
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
fortnitepy-bot-master/INSTALL PACKAGES.bat
Resource
win10v2004-20240221-en
Behavioral task
behavioral4
Sample
fortnitepy-bot-master/LICENSE
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
fortnitepy-bot-master/README.md
Resource
win10v2004-20240221-en
Behavioral task
behavioral6
Sample
fortnitepy-bot-master/START BOT.bat
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
fortnitepy-bot-master/config.json
Resource
win10v2004-20240221-en
Behavioral task
behavioral8
Sample
fortnitepy-bot-master/device_auths.json
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
fortnitepy-bot-master/fortnite.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral10
Sample
fortnitepy-bot-master/partybot/__init__.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
fortnitepy-bot-master/partybot/bot.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral12
Sample
fortnitepy-bot-master/partybot/client.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
fortnitepy-bot-master/partybot/cosmetic.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral14
Sample
fortnitepy-bot-master/partybot/deviceauths.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
fortnitepy-bot-master/partybot/errors.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral16
Sample
fortnitepy-bot-master/partybot/generator.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral17
Sample
fortnitepy-bot-master/partybot/helper.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral18
Sample
fortnitepy-bot-master/partybot/party.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral19
Sample
fortnitepy-bot-master/partybot/settings.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral20
Sample
fortnitepy-bot-master/requirements.txt
Resource
win10v2004-20240221-en
General
-
Target
fortnitepy-bot-master/START BOT.bat
-
Size
1KB
-
MD5
8c29c27144a6730c95dcb7d3f6fd5ada
-
SHA1
ab62c6933b13a0c58c0976470decb5f6d753cf0e
-
SHA256
0082d01cc214a08f919372ba9d76e4cfb5092351f2ff2a1b7dfafa805c403352
-
SHA512
3e31f30dcf1eb892ce4e0b62307f9d1cf2ea58bdc97d4c68a922495374d9637c42169d32afed48232670db1c9ae1fb6f5d8fab204e9985a0c19eb78976e59874
Malware Config
Extracted
https://www.python.org/ftp/python/3.7.0/python-3.7.0-amd64.exe
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exepowershell.exeflow pid process 2 4760 powershell.exe 5 4936 powershell.exe -
Downloads MZ/PE file
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exepowershell.exepid process 4760 powershell.exe 4760 powershell.exe 4936 powershell.exe 4936 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 4760 powershell.exe Token: SeDebugPrivilege 4936 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exedescription pid process target process PID 2152 wrote to memory of 4760 2152 cmd.exe powershell.exe PID 2152 wrote to memory of 4760 2152 cmd.exe powershell.exe PID 2152 wrote to memory of 4936 2152 cmd.exe powershell.exe PID 2152 wrote to memory of 4936 2152 cmd.exe powershell.exe PID 2152 wrote to memory of 468 2152 cmd.exe cmd.exe PID 2152 wrote to memory of 468 2152 cmd.exe cmd.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\fortnitepy-bot-master\START BOT.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadFile('https://www.python.org/ftp/python/3.7.0/python-3.7.0-amd64.exe', 'python-3.7.0-amd64.exe')"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest https://www.python.org/ftp/python/3.7.0/python-3.7.0-amd64.exe -OutFile python-3.7.0-amd64.exe"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
C:\Windows\system32\cmd.execmd /k2⤵PID:468
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c20ac38ae3022e305b8752804aadf486
SHA14c144d6cfafb5c37ab4810ff3c1744df81493cdb
SHA25603cba7e903a418a3966af1dc0debfb5fcfb2ac6d372ec48cb1b93c23e0fd1caf
SHA512c9def9e5cd09d19b8b47a3f4c61893da715a6ba4b9933c885386d0425ee4ccc30d75eac1097511619d4e6259a46581f803fb38f78a15339391e4e78b0b6153e0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e