Resubmissions

04-11-2024 18:04

241104-wn3dwatndx 10

03-11-2024 11:51

241103-n1hw1atble 10

General

  • Target

    GhostMenufortnite.exe

  • Size

    7.4MB

  • Sample

    241103-n1hw1atble

  • MD5

    bf3a3cd9846970e0b2884c799ffe42ce

  • SHA1

    6c88fd2dbbba342a771c4a83aae2ece40a6099b4

  • SHA256

    c3335bf2bd5442782b779825dd46b687dfdca60c3bacaaef40ba5102ed9f8cfb

  • SHA512

    e8c2fa5e986411f8827c083a44d467b60c281159bdd652e544628a431b5f9c1520ea749a547b79f53ebe5429d6f77e01c6b7c83c9bf46ea8b7dfeb10ae755c61

  • SSDEEP

    196608:k/0cDLLjv+bhqNVoBKUh8mz4Iv9PQv1DV2:FivL+9qz8/b4Imv32

Malware Config

Targets

    • Target

      GhostMenufortnite.exe

    • Size

      7.4MB

    • MD5

      bf3a3cd9846970e0b2884c799ffe42ce

    • SHA1

      6c88fd2dbbba342a771c4a83aae2ece40a6099b4

    • SHA256

      c3335bf2bd5442782b779825dd46b687dfdca60c3bacaaef40ba5102ed9f8cfb

    • SHA512

      e8c2fa5e986411f8827c083a44d467b60c281159bdd652e544628a431b5f9c1520ea749a547b79f53ebe5429d6f77e01c6b7c83c9bf46ea8b7dfeb10ae755c61

    • SSDEEP

      196608:k/0cDLLjv+bhqNVoBKUh8mz4Iv9PQv1DV2:FivL+9qz8/b4Imv32

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks