General

  • Target

    FortnitePETMOD.exe

  • Size

    17.8MB

  • Sample

    241005-g2q6fatgnf

  • MD5

    e06d1bbf4492ca80ef4fab8326368f91

  • SHA1

    9dc2d175c28bfe3517c257cad96d6f5910a1c89d

  • SHA256

    4e16bb16b5984aa14dcfb6c53ae4d950c2a6ce47455a7ffd72c7134464b9359d

  • SHA512

    028fd491a97bae54ee170d3a3c1a44d23f4306d9a2cb5e007255c9d03a732df2fe515666369a84675120fc19d9d093a206146826ac77807e937754b0fb7783c6

  • SSDEEP

    393216:EL/gLFXlryQ8DOETgsvfGFYgFo8vEBqNrtgwq:EL6FXNyQhEbcSSrA

Malware Config

Targets

    • Target

      FortnitePETMOD.exe

    • Size

      17.8MB

    • MD5

      e06d1bbf4492ca80ef4fab8326368f91

    • SHA1

      9dc2d175c28bfe3517c257cad96d6f5910a1c89d

    • SHA256

      4e16bb16b5984aa14dcfb6c53ae4d950c2a6ce47455a7ffd72c7134464b9359d

    • SHA512

      028fd491a97bae54ee170d3a3c1a44d23f4306d9a2cb5e007255c9d03a732df2fe515666369a84675120fc19d9d093a206146826ac77807e937754b0fb7783c6

    • SSDEEP

      393216:EL/gLFXlryQ8DOETgsvfGFYgFo8vEBqNrtgwq:EL6FXNyQhEbcSSrA

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks