Resubmissions

18/08/2024, 13:27

240818-qqkc7ayaqk 7

18/08/2024, 13:26

240818-qptkgayalp 8

General

  • Target

    Fortnite Cheat.exe

  • Size

    90KB

  • Sample

    240818-qptkgayalp

  • MD5

    918bc7d722d26a9d2d12f5759350b25d

  • SHA1

    586d1cd41dcc60f03ad6c57b43ede37fb2a18e23

  • SHA256

    ad7138c85a73c45168d48eb801961f9f574ec85f77cd0c7416ddeb1f42d20b99

  • SHA512

    0ac5ef8bb610d84772739689ffe4dba786012c2f77cb71bee0600a1c9b7f0644499d27220806bd93be1215fde2d75dea605d3957e2d832ba61c3ec8cfe15b2c4

  • SSDEEP

    1536:37fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfTwl6AOo:r7DhdC6kzWypvaQ0FxyNTBfTe6U

Malware Config

Targets

    • Target

      Fortnite Cheat.exe

    • Size

      90KB

    • MD5

      918bc7d722d26a9d2d12f5759350b25d

    • SHA1

      586d1cd41dcc60f03ad6c57b43ede37fb2a18e23

    • SHA256

      ad7138c85a73c45168d48eb801961f9f574ec85f77cd0c7416ddeb1f42d20b99

    • SHA512

      0ac5ef8bb610d84772739689ffe4dba786012c2f77cb71bee0600a1c9b7f0644499d27220806bd93be1215fde2d75dea605d3957e2d832ba61c3ec8cfe15b2c4

    • SSDEEP

      1536:37fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfTwl6AOo:r7DhdC6kzWypvaQ0FxyNTBfTe6U

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks