General

  • Target

    fortnite installer.exe

  • Size

    230KB

  • Sample

    240301-my61daff4t

  • MD5

    289b67e48da10ab68939056c3cd8bb2b

  • SHA1

    2b4665f3f61098c4ceec9208a01e75ac7e4b1d3d

  • SHA256

    545757791f0b6759a9da98687651c1ad9f32f86d8f3e7f5d163d2ebba8f4bc3e

  • SHA512

    c2c63302ebfc08c2be9e56174c2adc0b78a155d8d4954fc96532e37c459477cf896f3ab1ff60df181cd541c6cefffcd67f707ef07bde8b1474b6c3131034ff5c

  • SSDEEP

    6144:dloZM9rIkd8g+EtXHkv/iD4otP77Byal4gRj++7okb8e1mCi:/oZOL+EP8otP77Byal4gRj++7x4

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1213008738932232222/Fdyg2BL1XMNPuUH00U4Sz4tSsB28zPHmo5LM1ZgI0khZUCgO6V8OCwLstumSvpdROu7V

Targets

    • Target

      fortnite installer.exe

    • Size

      230KB

    • MD5

      289b67e48da10ab68939056c3cd8bb2b

    • SHA1

      2b4665f3f61098c4ceec9208a01e75ac7e4b1d3d

    • SHA256

      545757791f0b6759a9da98687651c1ad9f32f86d8f3e7f5d163d2ebba8f4bc3e

    • SHA512

      c2c63302ebfc08c2be9e56174c2adc0b78a155d8d4954fc96532e37c459477cf896f3ab1ff60df181cd541c6cefffcd67f707ef07bde8b1474b6c3131034ff5c

    • SSDEEP

      6144:dloZM9rIkd8g+EtXHkv/iD4otP77Byal4gRj++7okb8e1mCi:/oZOL+EP8otP77Byal4gRj++7x4

    Score
    10/10
    • Detect Umbral payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Drops file in Drivers directory

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks