General

  • Target

    fortnite.exe

  • Size

    1.3MB

  • Sample

    241104-gxk4mavmd1

  • MD5

    8d17e6244d984c3c44bd9efa22d90bd3

  • SHA1

    88c8edaa2ea2ed078454e738b1e30c882bbe3ee5

  • SHA256

    5b4c539067dc6db394d2367305e53555c250d636379acb2b384efe3d77738c63

  • SHA512

    bf800abfc7cd57fdc3c2ccd07527ba76f47d6d5426bb2d9107379db74e4b6d07ac4e8b6ff3f468e20a5e5302a01f9c1d39a0fe1bc2af4670bf8a00cab2ffdf1e

  • SSDEEP

    12288:6pqafF/eav6841vwUZF/NmXHBg52Kn4UxCj2AqeMQm6ZQyRWkhuq3nbep3+bKDZs:9Q/PDVQcE2Kn4uGKF6lpC+bKlAtc06L

Malware Config

Targets

    • Target

      fortnite.exe

    • Size

      1.3MB

    • MD5

      8d17e6244d984c3c44bd9efa22d90bd3

    • SHA1

      88c8edaa2ea2ed078454e738b1e30c882bbe3ee5

    • SHA256

      5b4c539067dc6db394d2367305e53555c250d636379acb2b384efe3d77738c63

    • SHA512

      bf800abfc7cd57fdc3c2ccd07527ba76f47d6d5426bb2d9107379db74e4b6d07ac4e8b6ff3f468e20a5e5302a01f9c1d39a0fe1bc2af4670bf8a00cab2ffdf1e

    • SSDEEP

      12288:6pqafF/eav6841vwUZF/NmXHBg52Kn4UxCj2AqeMQm6ZQyRWkhuq3nbep3+bKDZs:9Q/PDVQcE2Kn4uGKF6lpC+bKlAtc06L

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks