Resubmissions

28-10-2024 18:40

241028-xbmckavdme 10

28-10-2024 17:00

241028-vjddhssjam 10

General

  • Target

    fortnitecheeto.exe

  • Size

    14.4MB

  • Sample

    241028-vjddhssjam

  • MD5

    4f049e212457c98de8fd3707c6ac3a76

  • SHA1

    790b2037976e32ccb565fcaf2f6160a77a9ed652

  • SHA256

    cff04c83d4e75cce3af4ee3a4504e2b68b51ece8f5df4d2a30e24e0a7546bf20

  • SHA512

    d41522a2b69b24a62533635ced3348c7fabf9d11eb9d26b75f68b52cef679b5b8b8e4e4b2faecf27bae18b596c178a0ca7ba1a0df2ada49a1b942d46b7f9e20c

  • SSDEEP

    393216:0GZRFvSkyrU6VYiBp2q3a09cVTmo70VRHdKbAlbZA036hwDKLw:0G/FqrU8Bp2q3KTmowVebOH3iLw

Malware Config

Targets

    • Target

      fortnitecheeto.exe

    • Size

      14.4MB

    • MD5

      4f049e212457c98de8fd3707c6ac3a76

    • SHA1

      790b2037976e32ccb565fcaf2f6160a77a9ed652

    • SHA256

      cff04c83d4e75cce3af4ee3a4504e2b68b51ece8f5df4d2a30e24e0a7546bf20

    • SHA512

      d41522a2b69b24a62533635ced3348c7fabf9d11eb9d26b75f68b52cef679b5b8b8e4e4b2faecf27bae18b596c178a0ca7ba1a0df2ada49a1b942d46b7f9e20c

    • SSDEEP

      393216:0GZRFvSkyrU6VYiBp2q3a09cVTmo70VRHdKbAlbZA036hwDKLw:0G/FqrU8Bp2q3KTmowVebOH3iLw

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks