General

  • Target

    Fortnite.Hack.v1.13.zip

  • Size

    18.5MB

  • Sample

    250128-xgdmls1maj

  • MD5

    ee53f9ec9e6d44f01aae9f807a9a96bb

  • SHA1

    09e7a9cb70c0084c6d8ef722acbe7ad261edfbcd

  • SHA256

    1b03eef50b536f53074bb4d4b328386cf7bbc66103867da59435896acd1a5be5

  • SHA512

    8a5830dff391cf9a0b9f89326b31e0477d32d33f5e00927408e69d32e8155197a6c328e14ba57b67c61eee9edd1a75a7682493ac2ed1c1dcb6aa4e8a8b2181d5

  • SSDEEP

    393216:s/qfHPFxLpoSOq7iYVMYpKgJGTd3TbIhkdy4ShgQJE2+:sCfvFxVoSOfMpsZvyhM2+

Malware Config

Targets

    • Target

      Fortnite.Hack.Build.exe

    • Size

      18.7MB

    • MD5

      70ba753f7a4377b1ba124ca39ee64431

    • SHA1

      f50d57dd218e351ec350bb3ec003a197e38128b5

    • SHA256

      a4802283e46e31bdd42288512697a042b9196c64794b6634b60455a7ee682131

    • SHA512

      0ffe329fbcd784cfd03ff8e2a15501b2de57ae2c6f75a2b7c9c80949dd482187330c765dc4055f6bc59ba94eb5e9bcf3d6f404ca5918fc5ff37c29c5f52dbce1

    • SSDEEP

      393216:aqPnLFXlrnQMDOETgs77fGRgmie2vEVN2kloPvqo:vPLFXNnQRE7eNLPrlvo

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks