Overview
overview
10Static
static
1fortnitepy...er.zip
windows7-x64
1fortnitepy...er.zip
windows10-2004-x64
1fortnitepy...ignore
windows7-x64
3fortnitepy...ignore
windows10-2004-x64
3fortnitepy...ES.bat
windows7-x64
10fortnitepy...ES.bat
windows10-2004-x64
10fortnitepy...ICENSE
windows7-x64
1fortnitepy...ICENSE
windows10-2004-x64
1fortnitepy...DME.md
windows7-x64
3fortnitepy...DME.md
windows10-2004-x64
3fortnitepy...OT.bat
windows7-x64
10fortnitepy...OT.bat
windows10-2004-x64
10fortnitepy...g.json
windows7-x64
3fortnitepy...g.json
windows10-2004-x64
3fortnitepy...s.json
windows7-x64
3fortnitepy...s.json
windows10-2004-x64
3fortnitepy...ite.py
windows7-x64
3fortnitepy...ite.py
windows10-2004-x64
3fortnitepy...t__.py
windows7-x64
3fortnitepy...t__.py
windows10-2004-x64
3fortnitepy...bot.py
windows7-x64
3fortnitepy...bot.py
windows10-2004-x64
3fortnitepy...ent.py
windows7-x64
3fortnitepy...ent.py
windows10-2004-x64
3fortnitepy...tic.py
windows7-x64
3fortnitepy...tic.py
windows10-2004-x64
3fortnitepy...ths.py
windows7-x64
3fortnitepy...ths.py
windows10-2004-x64
3fortnitepy...ors.py
windows7-x64
3fortnitepy...ors.py
windows10-2004-x64
3fortnitepy...tor.py
windows7-x64
3fortnitepy...tor.py
windows10-2004-x64
3Resubmissions
21-02-2024 15:09
240221-sjgptshf7x 1021-02-2024 15:07
240221-shqlcahf6y 1021-02-2024 15:06
240221-sg6aeaac95 1021-02-2024 15:03
240221-se7qfsac57 1021-02-2024 15:02
240221-sejzdshf2s 1Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
21-02-2024 15:03
Static task
static1
Behavioral task
behavioral1
Sample
fortnitepy-bot-master.zip
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fortnitepy-bot-master.zip
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
fortnitepy-bot-master/.gitignore
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
fortnitepy-bot-master/.gitignore
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
fortnitepy-bot-master/INSTALL PACKAGES.bat
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
fortnitepy-bot-master/INSTALL PACKAGES.bat
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
fortnitepy-bot-master/LICENSE
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
fortnitepy-bot-master/LICENSE
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
fortnitepy-bot-master/README.md
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
fortnitepy-bot-master/README.md
Resource
win10v2004-20240220-en
Behavioral task
behavioral11
Sample
fortnitepy-bot-master/START BOT.bat
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
fortnitepy-bot-master/START BOT.bat
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
fortnitepy-bot-master/config.json
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
fortnitepy-bot-master/config.json
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
fortnitepy-bot-master/device_auths.json
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
fortnitepy-bot-master/device_auths.json
Resource
win10v2004-20240221-en
Behavioral task
behavioral17
Sample
fortnitepy-bot-master/fortnite.py
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
fortnitepy-bot-master/fortnite.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral19
Sample
fortnitepy-bot-master/partybot/__init__.py
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
fortnitepy-bot-master/partybot/__init__.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral21
Sample
fortnitepy-bot-master/partybot/bot.py
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
fortnitepy-bot-master/partybot/bot.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral23
Sample
fortnitepy-bot-master/partybot/client.py
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
fortnitepy-bot-master/partybot/client.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral25
Sample
fortnitepy-bot-master/partybot/cosmetic.py
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
fortnitepy-bot-master/partybot/cosmetic.py
Resource
win10v2004-20240220-en
Behavioral task
behavioral27
Sample
fortnitepy-bot-master/partybot/deviceauths.py
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
fortnitepy-bot-master/partybot/deviceauths.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral29
Sample
fortnitepy-bot-master/partybot/errors.py
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
fortnitepy-bot-master/partybot/errors.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral31
Sample
fortnitepy-bot-master/partybot/generator.py
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
fortnitepy-bot-master/partybot/generator.py
Resource
win10v2004-20240221-en
General
-
Target
fortnitepy-bot-master/README.md
-
Size
1KB
-
MD5
bc5d7592be055a904f8f08d5b7cfb82b
-
SHA1
e3b17c17fcddecd8987d981f8447bc2dcbc17b28
-
SHA256
075ba34db3d8a71fe5e34d034d2793d11de5c51e8caf340c9b00e97faa245e0e
-
SHA512
376a5f56db4a97dbcc52e51273ff844e1dfa35ed4a44dbc7b2f04091299216b73a75265e6982968d2903c00ecfde7120b845900c22eb4fbcaa14edc2a6a188a1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\md_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.md\ = "md_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\md_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\md_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\md_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\.md rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\md_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000_CLASSES\md_auto_file rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2800 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2800 AcroRd32.exe 2800 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2736 3052 cmd.exe 29 PID 3052 wrote to memory of 2736 3052 cmd.exe 29 PID 3052 wrote to memory of 2736 3052 cmd.exe 29 PID 2736 wrote to memory of 2800 2736 rundll32.exe 30 PID 2736 wrote to memory of 2800 2736 rundll32.exe 30 PID 2736 wrote to memory of 2800 2736 rundll32.exe 30 PID 2736 wrote to memory of 2800 2736 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\fortnitepy-bot-master\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\fortnitepy-bot-master\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\fortnitepy-bot-master\README.md"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD518eee8b8d5d4ca6a81ab4502d01239df
SHA1184aea03a3ae79945238e7f7b9c415e14c40dbe2
SHA256d47865c36c4345f06e76765a99301f63f5130aed9b62ea7ffc9eab5bcc9f3600
SHA512771d9634db43dd827825f4a76904a92d4cf3b17764293c9f2667124aa1d0628cfb02b2fa89a53bba11a312a4865e66ba003394d8dfae010d10401863c7ed0f1c