Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 21:01
Behavioral task
behavioral1
Sample
fortnite account grabber 2025.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fortnite account grabber 2025.exe
Resource
win10v2004-20241007-en
General
-
Target
fortnite account grabber 2025.exe
-
Size
6.0MB
-
MD5
12bb4f2cbab13ce5b9e87c1ab4b60d42
-
SHA1
9f7ee1c63c7b4fb7dbdb758763fa3f3e2faf19db
-
SHA256
12620e15cd97acac5dc6b3867a3f861ee9a6dc636466518d6ebd5db4d9ac677a
-
SHA512
bbfc596b7e473f9e8d5b3931374d8212be00dcca65b6eade070aa39fcb281284ca348dc13828d098423558c857050921bd71a0c3707ebf9e6445aa9cbe68ed05
-
SSDEEP
98304:IsEtdFBCm/I540amaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RgOnAKF7gHa:IbFIm/z1eN/FJMIDJf0gsAGK4RrnAKFr
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2844 fortnite account grabber 2025.exe -
resource yara_rule behavioral1/files/0x000500000001960a-21.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2844 2756 fortnite account grabber 2025.exe 30 PID 2756 wrote to memory of 2844 2756 fortnite account grabber 2025.exe 30 PID 2756 wrote to memory of 2844 2756 fortnite account grabber 2025.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fortnite account grabber 2025.exe"C:\Users\Admin\AppData\Local\Temp\fortnite account grabber 2025.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\fortnite account grabber 2025.exe"C:\Users\Admin\AppData\Local\Temp\fortnite account grabber 2025.exe"2⤵
- Loads dropped DLL
PID:2844
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5178a0f45fde7db40c238f1340a0c0ec0
SHA1dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe
SHA2569fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed
SHA5124b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee