General

  • Target

    Project_X_OG_Fortnite.exe

  • Size

    30.9MB

  • Sample

    240526-zj17sscd95

  • MD5

    4a933c666b22528babe554047ca4f3a2

  • SHA1

    8fe4ee08d214d1243e9a4e7c17adbc1611ca01fa

  • SHA256

    4489c997fd74ed26cbc243809625d9ba57f797890d80a1c33988a42bffb51dc8

  • SHA512

    caaeb5fecccc871f8e47bcd2e66713a54233fa2e764cc2e9ba7431d6fa15fe4f78b557d4488c6b23f6dc22c2af28fd1eebfeaecec42e0a6e11c92efe10341c9c

  • SSDEEP

    786432:SsoWZTUG4wRUkMmuFdg0I7XvQSxvnuUNGJYTUd:HZTtMmuTGRv+

Score
7/10

Malware Config

Targets

    • Target

      Project_X_OG_Fortnite.exe

    • Size

      30.9MB

    • MD5

      4a933c666b22528babe554047ca4f3a2

    • SHA1

      8fe4ee08d214d1243e9a4e7c17adbc1611ca01fa

    • SHA256

      4489c997fd74ed26cbc243809625d9ba57f797890d80a1c33988a42bffb51dc8

    • SHA512

      caaeb5fecccc871f8e47bcd2e66713a54233fa2e764cc2e9ba7431d6fa15fe4f78b557d4488c6b23f6dc22c2af28fd1eebfeaecec42e0a6e11c92efe10341c9c

    • SSDEEP

      786432:SsoWZTUG4wRUkMmuFdg0I7XvQSxvnuUNGJYTUd:HZTtMmuTGRv+

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks