General

  • Target

    Fortnite Account Pull.exe

  • Size

    38.3MB

  • Sample

    240822-qm7djsygng

  • MD5

    8eb10d5fdc29e6d51f233058845c4ab7

  • SHA1

    f36691b12dc1733233bc46205b82d1b761381257

  • SHA256

    9f44152b6ddbd520a4fbdaec0c59c276ce5d69449687fad8fb2b7a27ebaae995

  • SHA512

    edbdc1823faacd289ebb97b4d8cb71cf83db6ac91307bba7a4b38ca1bda24465a2696e7ddcd8d65358cda801e62005b0ce6e1d43da9ac86b8413ce54cd1bdb4e

  • SSDEEP

    786432:QZ0xp9m8Shf0NTJTfwc55rgkizx/z7cVk3K5BZRYR9UtVXRG2LnuQw:Q2p9m8Shf0dJT7rbi9/6kqZRwUTRRJ

Malware Config

Targets

    • Target

      Fortnite Account Pull.exe

    • Size

      38.3MB

    • MD5

      8eb10d5fdc29e6d51f233058845c4ab7

    • SHA1

      f36691b12dc1733233bc46205b82d1b761381257

    • SHA256

      9f44152b6ddbd520a4fbdaec0c59c276ce5d69449687fad8fb2b7a27ebaae995

    • SHA512

      edbdc1823faacd289ebb97b4d8cb71cf83db6ac91307bba7a4b38ca1bda24465a2696e7ddcd8d65358cda801e62005b0ce6e1d43da9ac86b8413ce54cd1bdb4e

    • SSDEEP

      786432:QZ0xp9m8Shf0NTJTfwc55rgkizx/z7cVk3K5BZRYR9UtVXRG2LnuQw:Q2p9m8Shf0dJT7rbi9/6kqZRwUTRRJ

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks