Analysis
-
max time kernel
6s -
max time network
6s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 15:03
General
-
Target
FortniteAimbotESP.exe
-
Size
28KB
-
MD5
a863d73e691e352731c313d8bf2562d0
-
SHA1
14789c7c44aea7838cdeb4aa40cb392e6ea2cd54
-
SHA256
e0cf5d340422e29ed6f46d84e22af1e38fef342ede85172d9c4af65ea86886d0
-
SHA512
3f460657e119200b3784c433770705af51521472f0514f3c9dc32f25edab8cbcb2c83374a1ec389f1e175f218ac4aa93740b56f89a5a49c87202726e5a649e86
-
SSDEEP
768:wpex6txrwNpUpyxdJ745NDbnEY4R6Xxldj:wpddwNpcQTk/bXb
Malware Config
Extracted
Family
limerat
Attributes
-
aes_key
blunts
-
antivm
true
-
c2_url
https://pastebin.com/raw/1NRAsuVh
-
delay
3
-
download_payload
false
-
install
true
-
install_name
FortniteAimbotESP.exe
-
main_folder
Temp
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Signatures
-
Limerat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FortniteAimbotESP.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2604 FortniteAimbotESP.exe Token: SeDebugPrivilege 2604 FortniteAimbotESP.exe