Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
Optimized_Pack_For_Fortnite.exe
-
Size
13.9MB
-
Sample
250228-2c5yhsz1fz
-
MD5
c01591910301afefce57e78471009185
-
SHA1
a1a7d3a97204acb1a64117fba984770abc5b6d3b
-
SHA256
041f5db0a0c289c686db8adf4a72fc70ff2ab19339f7f10b3304dee8d327e47b
-
SHA512
74d96bae1a0047c1741482ad2910e4e1b8dc519741cd1353c784b38c94de1c68575b611976032792a630fcfe1b4e4e27b54952e33c17b3b35e75005b2b882a40
-
SSDEEP
196608:DC/lOqPnih8FXj+hYeB0sKYu/PaQhKDnO8NpHzgsAGKaRZtG7cvdStqlK2Gv0NQa:hqPnLFCjQ8DOETgsv/Gw+6KD0U/k
Behavioral task
behavioral1
Sample
Optimized_Pack_For_Fortnite.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Optimized_Pack_For_Fortnite.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
Optimized_Pack_For_Fortnite.exe
-
Size
13.9MB
-
MD5
c01591910301afefce57e78471009185
-
SHA1
a1a7d3a97204acb1a64117fba984770abc5b6d3b
-
SHA256
041f5db0a0c289c686db8adf4a72fc70ff2ab19339f7f10b3304dee8d327e47b
-
SHA512
74d96bae1a0047c1741482ad2910e4e1b8dc519741cd1353c784b38c94de1c68575b611976032792a630fcfe1b4e4e27b54952e33c17b3b35e75005b2b882a40
-
SSDEEP
196608:DC/lOqPnih8FXj+hYeB0sKYu/PaQhKDnO8NpHzgsAGKaRZtG7cvdStqlK2Gv0NQa:hqPnLFCjQ8DOETgsv/Gw+6KD0U/k
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
main.pyc
-
Size
1KB
-
MD5
2c39c6452298d0724185d2df509115f3
-
SHA1
ca56fa4bc84ff0b78479ca0e046d76041cf74730
-
SHA256
8ae3e67a0ef604922d3e05b7bd9d0072c7585de48dce207885a6516bdeeb9811
-
SHA512
6e9a58853b179ec378c2f2da41b156505ebbdf2e129a7a8d21262f18d8abc1fd09f40fee4d3e09fa8e504e61a85545e28fb436fabd86093983a2b1aabc4148ed
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1