Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 12:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Fortnite Hack v3.0.exe
Resource
win7-20241010-en
windows7-x64
10 signatures
150 seconds
General
-
Target
Fortnite Hack v3.0.exe
-
Size
1.5MB
-
MD5
fcfde04d923f7cf7ab3fd2386dc86664
-
SHA1
c38f90e846815800ef9a4a70eeed5ad40b1406d4
-
SHA256
1c37bb084606972c2b52abd675e81a7ce129fad41d5f684ee459012de7bb2875
-
SHA512
a45e689eef3b279558204ef9de9c8a68e279155eb62e220279f3f49ced69e3ac136cd6f9717fda1868353c374df04eb0800b3eee19ca3f6997d25e6f2d63af79
-
SSDEEP
12288:Akvni7EZYZWTehf95eA1Gon0C3RX7aBfn4IfVLbO/2FKG6o:Lizl133
Malware Config
Extracted
Family
redline
Botnet
@hensssy
C2
uspeelayla.xyz:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2420-11-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2420-16-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2420-13-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2420-8-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/2420-7-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Redline family
-
SectopRAT payload 5 IoCs
resource yara_rule behavioral1/memory/2420-11-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2420-16-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2420-13-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2420-8-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat behavioral1/memory/2420-7-0x0000000000400000-0x000000000041E000-memory.dmp family_sectoprat -
Sectoprat family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3052 set thread context of 2420 3052 Fortnite Hack v3.0.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fortnite Hack v3.0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fortnite Hack v3.0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2420 Fortnite Hack v3.0.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2420 3052 Fortnite Hack v3.0.exe 31 PID 3052 wrote to memory of 2420 3052 Fortnite Hack v3.0.exe 31 PID 3052 wrote to memory of 2420 3052 Fortnite Hack v3.0.exe 31 PID 3052 wrote to memory of 2420 3052 Fortnite Hack v3.0.exe 31 PID 3052 wrote to memory of 2420 3052 Fortnite Hack v3.0.exe 31 PID 3052 wrote to memory of 2420 3052 Fortnite Hack v3.0.exe 31 PID 3052 wrote to memory of 2420 3052 Fortnite Hack v3.0.exe 31 PID 3052 wrote to memory of 2420 3052 Fortnite Hack v3.0.exe 31 PID 3052 wrote to memory of 2420 3052 Fortnite Hack v3.0.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fortnite Hack v3.0.exe"C:\Users\Admin\AppData\Local\Temp\Fortnite Hack v3.0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\Fortnite Hack v3.0.exe"C:\Users\Admin\AppData\Local\Temp\Fortnite Hack v3.0.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2420
-