Analysis
-
max time kernel
21s -
max time network
25s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 18:56
Behavioral task
behavioral1
Sample
aifortnite.exe
Resource
win10v2004-20250314-en
General
-
Target
aifortnite.exe
-
Size
72KB
-
MD5
ec3e620af2f13f4decab94c736fc7b32
-
SHA1
fc9dc2cd3a68738caace83a951fd58dd25c81d45
-
SHA256
ca2b1eecfa86ad5966a6c70f50d4f5b2d044ed1139edc8aad4ccc66f5dbe4283
-
SHA512
4eaf6f7c067e8745381e2206acaad027608e052679d9aa0cc963c8ad22aff56c1c245fc297a0f65e41b1b1745833ff11f41c7ffad42014923b2b435e979b2dfc
-
SSDEEP
1536:I9EH7LClOPGSE5u2v6ZvM7A4HhT62YGcUO96xhhMb+KR0Nc8QsJq39:IEH7LwI2CZvM7A4BT61Gcv9ihe0Nc8Qb
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.0.148:12345
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aifortnite.exe