General

  • Target

    Fortnite.exe

  • Size

    77.7MB

  • Sample

    241124-sh83pa1pbr

  • MD5

    97178a64f9575409687576147522c8d5

  • SHA1

    cff8a2ed89c63e6151826d7f702a3bf6aab383a8

  • SHA256

    6348a47d7e11f5d770e81795494e91620e32f531751bc29670f557ff1524422c

  • SHA512

    843df4051021cc7a9a670cd7154c1340c65eca5a636b2fc9de82c777e1a96f28e11a894315ad13bfd90eee186192df74daab1e7b65ccc39cd8e674eb7e99604d

  • SSDEEP

    1572864:Rx1lLW/10hSk8IpG7V+VPhqqxE7LlhpBB8iYweyJulZUdgP7Ul+aswzteN:H1B+uSkB05awqeLpnNpur741teN

Malware Config

Targets

    • Target

      Fortnite.exe

    • Size

      77.7MB

    • MD5

      97178a64f9575409687576147522c8d5

    • SHA1

      cff8a2ed89c63e6151826d7f702a3bf6aab383a8

    • SHA256

      6348a47d7e11f5d770e81795494e91620e32f531751bc29670f557ff1524422c

    • SHA512

      843df4051021cc7a9a670cd7154c1340c65eca5a636b2fc9de82c777e1a96f28e11a894315ad13bfd90eee186192df74daab1e7b65ccc39cd8e674eb7e99604d

    • SSDEEP

      1572864:Rx1lLW/10hSk8IpG7V+VPhqqxE7LlhpBB8iYweyJulZUdgP7Ul+aswzteN:H1B+uSkB05awqeLpnNpur741teN

    • Modifies visiblity of hidden/system files in Explorer

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks