General
-
Target
FortniteExternal.exe
-
Size
39KB
-
Sample
241221-xgr51awnds
-
MD5
cffb27bf1ba05391482df627dc8504e4
-
SHA1
c7deb87c21a1bb2b97e3ded00edf56578acf3aac
-
SHA256
a9a90a7ba273affb69647f2eabb614e4dcd2c6acbb82c2b1bb3cb4b936e5fffe
-
SHA512
9132d00fadc97bca3a6246f86bfc745d18227928ecd8a66e2495e788ce628df41b3eaf5270a25f2c7818aef41765a18a3ecb09c2aed3ac47d9d02894098ac1ee
-
SSDEEP
768:xldEjfYrbTQA+mzUMDmNwS9yVSErxnXneI6zDf9BQj0/nyc3v:xld8mzJmPqSExgzDft/nFv
Static task
static1
Behavioral task
behavioral1
Sample
FortniteExternal.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
FortniteExternal.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
1.4.1
Runtime Broker
92.221.125.55:49868
73f0bf3a-83f3-424b-b7a1-a8200df3e317
-
encryption_key
5CB2755608EFDB1313EF4F2ACEA101833F5AEE2B
-
install_name
Runtime Broker.exe
-
log_directory
Logs
-
reconnect_delay
100
-
startup_key
System
-
subdirectory
SubDir
Targets
-
-
Target
FortniteExternal.exe
-
Size
39KB
-
MD5
cffb27bf1ba05391482df627dc8504e4
-
SHA1
c7deb87c21a1bb2b97e3ded00edf56578acf3aac
-
SHA256
a9a90a7ba273affb69647f2eabb614e4dcd2c6acbb82c2b1bb3cb4b936e5fffe
-
SHA512
9132d00fadc97bca3a6246f86bfc745d18227928ecd8a66e2495e788ce628df41b3eaf5270a25f2c7818aef41765a18a3ecb09c2aed3ac47d9d02894098ac1ee
-
SSDEEP
768:xldEjfYrbTQA+mzUMDmNwS9yVSErxnXneI6zDf9BQj0/nyc3v:xld8mzJmPqSExgzDft/nFv
-
Quasar family
-
Quasar payload
-
Xmrig family
-
XMRig Miner payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1