Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Behavioral task
behavioral1
Sample
Fortnite hook.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Fortnite hook.exe
Resource
win11-20240802-en
General
-
Target
Fortnite hook.exe
-
Size
78KB
-
MD5
81c119c659e7dae7ac35c7724368183d
-
SHA1
d454fb2cd51c7e459289726a2a67c836ecb2e49d
-
SHA256
e0de0454ee94f0521a52883a610a317118926351a423033c9e0c19c685e5c573
-
SHA512
4d57a8c2f05177271580043aa6919f718ddb9ac3ab2067f99709446afce6bd1585f0b4402eb02ade1e13f596838b709202d78cedf7d31220f33e95cfdeb2b36a
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V++PIC:5Zv5PDwbjNrmAE+6IC
Malware Config
Extracted
discordrat
-
discord_token
MTI4OTYzNjI3MDM1NTc3NTUzMA.Ge3CBC.Gx2nDH3psM7IKxiEcuDpDndkDEmhtl7nYvT8jU
-
server_id
1289636027106852907
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Fortnite hook.exe
Files
-
Fortnite hook.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ