General

  • Target

    FrotniteExternal.exe

  • Size

    37KB

  • Sample

    241220-b9mv4awld1

  • MD5

    923d13d8499dd65d87611264a8e43002

  • SHA1

    fcd2ede4ea47146687a642c8f60385e33edc5bb5

  • SHA256

    d3a28b447201702f21bbf9f2bd7acf95962e613632f7b19be41f3636c74a1b72

  • SHA512

    0b103b74f6368e7a46cf9371e534fd28339f1c04712e91de3f7f38ac81e4b9c0a3a5c79fe7e8411ce883038951c07cdee7b8944380e65e56d171e2103c2f4582

  • SSDEEP

    768:whrLAIpwTDqbVLiqy64839q9Mq/oiE9aycHGj:oeqB2qy6x81O

Malware Config

Targets

    • Target

      FrotniteExternal.exe

    • Size

      37KB

    • MD5

      923d13d8499dd65d87611264a8e43002

    • SHA1

      fcd2ede4ea47146687a642c8f60385e33edc5bb5

    • SHA256

      d3a28b447201702f21bbf9f2bd7acf95962e613632f7b19be41f3636c74a1b72

    • SHA512

      0b103b74f6368e7a46cf9371e534fd28339f1c04712e91de3f7f38ac81e4b9c0a3a5c79fe7e8411ce883038951c07cdee7b8944380e65e56d171e2103c2f4582

    • SSDEEP

      768:whrLAIpwTDqbVLiqy64839q9Mq/oiE9aycHGj:oeqB2qy6x81O

    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks