General

  • Target

    FortnitePrivateLoader.zip

  • Size

    76.5MB

  • Sample

    241019-zgd99axfrb

  • MD5

    f6e14260a64c8ec012e588e66202207a

  • SHA1

    3c058c3596fc1a34eb16b095f3faa6bd057c4135

  • SHA256

    c666a9cd650dcbdaa086fca12a13f1422dca1af3980c24101df871747c500b1e

  • SHA512

    3a96b4e8ab62f3eecb3a07dcc2878e3602d52e44c2f849ea16fbeb7eeb778c7502dc84dc66fa6ea7ae78e3c0c8566080e3be2214078a47b283fe9ff4fc901931

  • SSDEEP

    1572864:mAcmPPZdNCtAlavcmpggH9JNjaQXJX2GlY2mZq0rvLXhJXX3701iFQ0YtN1C7:mAxPAWla8wzdX/ljiqIzoCc0

Malware Config

Targets

    • Target

      Fortnite Private Loader/Fortnite Private Loader.exe

    • Size

      76.8MB

    • MD5

      259ebae45c96b2c72f2869236e64fa37

    • SHA1

      3f15c7b2235684ac2fda90141737028b4297280c

    • SHA256

      c448ebd8f3cdc7981bfab0cb15060fff0ffbd1e3c9029350dc6e4dab6789eef0

    • SHA512

      2a5e182d78b097a1aabd258cc9bcd0e091da592313324dcf674d023befd9d95c85d77d88d56ca167e0b880dafd114c803192be705f293a3fb4bc0d181109b051

    • SSDEEP

      1572864:d1lBWPY0ASk8IpG7V+VPhqYdIFE7vlhNiYweyJulZUdgErleqfaqZ9Uu:d1zbSkB05awcIeLapuwrd9U

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks