General
-
Target
fortnite.exe
-
Size
6.9MB
-
Sample
250107-2p3zpatrcj
-
MD5
4e7ac63e3bd08eb92d5e35efc70790bb
-
SHA1
9463b417d7aebde9e1eda7c7eef800365a322a19
-
SHA256
fe9d5c81b919074224f1765c9f495bb77032a1ebcf36f694dc891db5c86b268a
-
SHA512
01a6668a3ed82f62ed8a7dc92359697b71d779e50a02ea70778b95b3de87290a50b38bdd107a6275bbebeb8bbac6878496216fe3b836dcd795a2b489aa6c9e1f
-
SSDEEP
98304:TTDjWM8JEE1FMramaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRiYRJJcGhEIFw:TT0GOeNTfm/pf+xk4dWRimrbW3jmyn
Behavioral task
behavioral1
Sample
fortnite.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
fortnite.exe
-
Size
6.9MB
-
MD5
4e7ac63e3bd08eb92d5e35efc70790bb
-
SHA1
9463b417d7aebde9e1eda7c7eef800365a322a19
-
SHA256
fe9d5c81b919074224f1765c9f495bb77032a1ebcf36f694dc891db5c86b268a
-
SHA512
01a6668a3ed82f62ed8a7dc92359697b71d779e50a02ea70778b95b3de87290a50b38bdd107a6275bbebeb8bbac6878496216fe3b836dcd795a2b489aa6c9e1f
-
SSDEEP
98304:TTDjWM8JEE1FMramaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRiYRJJcGhEIFw:TT0GOeNTfm/pf+xk4dWRimrbW3jmyn
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3