General
-
Target
fortnite_GenV2.exe
-
Size
12.7MB
-
Sample
240609-q9yd6abc6y
-
MD5
3537262e3aaca5e9b7e8bbfa401568a9
-
SHA1
5925fce917694c7aa99b68c8c989bd4b0086d985
-
SHA256
85ad2e8ea6fa3e4a9e156514eb4ca74b2b846420c4d4d5d8e1f840fa722ac401
-
SHA512
fbc974b6160a58591b9b8a959bbab73ca00c4441820c64e35271df1dd5e9f2fb69d10617b7c8f1aa648bd3c518c6d4f182a6240740ebf10f1747c76530883afb
-
SSDEEP
393216:pGQdqUL01+l+uq+Vv2dQJlewF3MnG3xl5x+EnmwumOB:pGq501+l+uqgv2dQT3MGxgbL
Behavioral task
behavioral1
Sample
fortnite_GenV2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fortnite_GenV2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
fortnite_GenV2.exe
-
Size
12.7MB
-
MD5
3537262e3aaca5e9b7e8bbfa401568a9
-
SHA1
5925fce917694c7aa99b68c8c989bd4b0086d985
-
SHA256
85ad2e8ea6fa3e4a9e156514eb4ca74b2b846420c4d4d5d8e1f840fa722ac401
-
SHA512
fbc974b6160a58591b9b8a959bbab73ca00c4441820c64e35271df1dd5e9f2fb69d10617b7c8f1aa648bd3c518c6d4f182a6240740ebf10f1747c76530883afb
-
SSDEEP
393216:pGQdqUL01+l+uq+Vv2dQJlewF3MnG3xl5x+EnmwumOB:pGq501+l+uqgv2dQT3MGxgbL
Score10/10-
Exela Stealer
Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Modifies Windows Firewall
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Stub.pyc
-
Size
875KB
-
MD5
994e5f5af9453a94fb564fb2752086fe
-
SHA1
e1c026a9988640d6d93a584a2528dc286a159c8e
-
SHA256
11d5f78cd57c4c73bff8a3335859ea716e50eb3ede69171b6c06db2f6dcad974
-
SHA512
94b3f4eeb18d12d517e840f0132ff2b5328e93588a4e98f44d336403676a629e5ec99b303e4afb54bd6de1b0d8520fdda2b991655fe3a815fb63c1ab061a03dc
-
SSDEEP
24576:aXFhLhlhWWVOR87KmIgsk7CVzvSF+1pJtf:a7z7mJaA1pr
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Account Manipulation
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Account Manipulation
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1