Malware Analysis Report

2025-05-28 17:20

Sample ID 250518-vlbmpswjw4
Target FortniteBurger_v2.zip
SHA256 3bf9012b5ddf0f59083f046cc19fd42c899f71070e1d90c35820dfc23359bce9
Tags
zgrat rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V16

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3bf9012b5ddf0f59083f046cc19fd42c899f71070e1d90c35820dfc23359bce9

Threat Level: Known bad

The file FortniteBurger_v2.zip was found to be: Known bad.

Malicious Activity Summary

zgrat rat

Detect ZGRat V2

Zgrat family

ZGRat

Executes dropped EXE

Loads dropped DLL

Legitimate hosting services abused for malware hosting/C2

Suspicious use of NtSetInformationThreadHideFromDebugger

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-05-18 17:04

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-05-18 17:04

Reported

2025-05-18 17:06

Platform

win10v2004-20250502-en

Max time kernel

62s

Max time network

141s

Command Line

"C:\Users\Admin\AppData\Local\Temp\FortniteBurger_v2.exe"

Signatures

Detect ZGRat V2

Description Indicator Process Target
N/A N/A N/A N/A

ZGRat

rat zgrat

Zgrat family

zgrat

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A raw.githubusercontent.com N/A N/A
N/A raw.githubusercontent.com N/A N/A
N/A raw.githubusercontent.com N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\FortniteBurger2\Run\96ab9148f91b44159cbc68fb0fbc2559.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\FortniteBurger_v2.exe

"C:\Users\Admin\AppData\Local\Temp\FortniteBurger_v2.exe"

C:\Users\Admin\AppData\Local\FortniteBurger2\Run\FortniteBurger_v2.exe

"C:\Users\Admin\AppData\Local\FortniteBurger2\Run\FortniteBurger_v2.exe" --continue

C:\Users\Admin\AppData\Local\FortniteBurger2\Run\96ab9148f91b44159cbc68fb0fbc2559.exe

"C:\Users\Admin\AppData\Local\FortniteBurger2\Run\96ab9148f91b44159cbc68fb0fbc2559.exe" --continue

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 150.171.28.10:443 g.bing.com tcp
US 8.8.8.8:53 raw.githubusercontent.com udp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 8.8.8.8:53 sisolutions.vip udp
US 185.199.108.133:443 raw.githubusercontent.com tcp
DK 93.191.156.20:443 sisolutions.vip tcp
DK 93.191.156.20:443 sisolutions.vip tcp
DK 93.191.156.20:443 sisolutions.vip tcp
GB 2.18.27.76:443 www.bing.com tcp
GB 2.18.27.76:443 www.bing.com tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 c.pki.goog udp
GB 142.250.178.3:80 c.pki.goog tcp

Files

memory/3076-57-0x00007FF80CFEB000-0x00007FF80CFEC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\.net\FortniteBurger_v2\jG4I8EjH2Uht_bQwKhDNlmHg04VYWFo=\svchost.dll

MD5 d34da837298440c94597fc11e35d8eac
SHA1 074c8a4eebaff81019bce8eb5f25efdc54d7400c
SHA256 e0b0c4da536b40be97aa04da748bc64b28c19ef7898f053c8e9f07db9fd7559a
SHA512 bdf5ce3e07118773aaa7d6ff75ac3c5e71263e612da3c691d25d225f66a16fd8f8089d41a466e04e5677b1288ee4b1719eb200f5ed5c5c1dc05c49a59561b501

C:\Users\Admin\AppData\Local\FortniteBurger2\Run\FortniteBurger_v2.exe

MD5 e1727f481fd66463ed281daaeeaf675b
SHA1 641e44acf38b4272f2d37a824c9764fe1310b3fc
SHA256 7ab735a88ae95c23810f69d18ee078a19de1894d3beb1e2a512e0688d21c43bc
SHA512 23504a336dff888eeb9fd84d85dcf7ee434c41db8eec701473f06df06a62683a947d836b81f7a8de923b682cac769a2566870392ae5b834b9a48cb20e35e95e8

memory/1984-69-0x00007FF80CE90000-0x00007FF80D38E000-memory.dmp

C:\Users\Admin\AppData\Local\FortniteBurger2\Run\96ab9148f91b44159cbc68fb0fbc2559.exe

MD5 392c3929eea08dd2474e6caaaae3477c
SHA1 1b19aa2f3ac9bbcd67820eb9b4e729659e09287b
SHA256 d9043984c8772025f8c5c0a27c3d9973ae93b8e3d9474fe6f75f8f7aa0eecbc2
SHA512 fe02a7e550f88be30c4b2145a28c2e2acb20ab4715df95f3df8b50a85fab1e77d826f8d8fcaa8cb6c276c5057ab8329329088c240966c57ce634bfaabc146f16

memory/1984-132-0x00007FF80CE90000-0x00007FF80D38E000-memory.dmp

memory/1232-137-0x00007FF80CE90000-0x00007FF80D38E000-memory.dmp

memory/1232-156-0x00007FF80CE90000-0x00007FF80D38E000-memory.dmp

C:\Users\Admin\AppData\Local\FortniteBurger2\Profiles\MarketWithPerks.json

MD5 a8a705381e73bc7beba7532818e2767b
SHA1 386b8e6b4dae114414ba91e44c346275864ae6b6
SHA256 796242d7cddd0c96e1c05f93406ec5c84d80033b97b4e02da5526a98fb9c0808
SHA512 7645e7e642c48c19e73c84f2bcdd5b1ad6f29f280369baa26363a217a0dd9bd6db890e73a166fc1a66983b210a32b94971c22301605ce04e7e52f476b80d793c

Analysis: behavioral2

Detonation Overview

Submitted

2025-05-18 17:04

Reported

2025-05-18 17:06

Platform

win11-20250502-en

Max time kernel

61s

Max time network

101s

Command Line

"C:\Users\Admin\AppData\Local\Temp\FortniteBurger_v2.exe"

Signatures

Detect ZGRat V2

Description Indicator Process Target
N/A N/A N/A N/A

ZGRat

rat zgrat

Zgrat family

zgrat

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A raw.githubusercontent.com N/A N/A
N/A raw.githubusercontent.com N/A N/A
N/A raw.githubusercontent.com N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\FortniteBurger2\Run\2403bb5a8f8f4d16bd8051d7d0404996.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\FortniteBurger_v2.exe

"C:\Users\Admin\AppData\Local\Temp\FortniteBurger_v2.exe"

C:\Users\Admin\AppData\Local\FortniteBurger2\Run\FortniteBurger_v2.exe

"C:\Users\Admin\AppData\Local\FortniteBurger2\Run\FortniteBurger_v2.exe" --continue

C:\Users\Admin\AppData\Local\FortniteBurger2\Run\2403bb5a8f8f4d16bd8051d7d0404996.exe

"C:\Users\Admin\AppData\Local\FortniteBurger2\Run\2403bb5a8f8f4d16bd8051d7d0404996.exe" --continue

Network

Country Destination Domain Proto
US 8.8.8.8:53 raw.githubusercontent.com udp
US 185.199.109.133:443 raw.githubusercontent.com tcp
US 185.199.109.133:443 raw.githubusercontent.com tcp
DK 93.191.156.20:443 sisolutions.vip tcp
DK 93.191.156.20:443 sisolutions.vip tcp
DK 93.191.156.20:443 sisolutions.vip tcp

Files

memory/2692-57-0x00007FFAF01FB000-0x00007FFAF01FC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\.net\FortniteBurger_v2\jG4I8EjH2Uht_bQwKhDNlmHg04VYWFo=\svchost.dll

MD5 d34da837298440c94597fc11e35d8eac
SHA1 074c8a4eebaff81019bce8eb5f25efdc54d7400c
SHA256 e0b0c4da536b40be97aa04da748bc64b28c19ef7898f053c8e9f07db9fd7559a
SHA512 bdf5ce3e07118773aaa7d6ff75ac3c5e71263e612da3c691d25d225f66a16fd8f8089d41a466e04e5677b1288ee4b1719eb200f5ed5c5c1dc05c49a59561b501

C:\Users\Admin\AppData\Local\FortniteBurger2\Run\FortniteBurger_v2.exe

MD5 e1727f481fd66463ed281daaeeaf675b
SHA1 641e44acf38b4272f2d37a824c9764fe1310b3fc
SHA256 7ab735a88ae95c23810f69d18ee078a19de1894d3beb1e2a512e0688d21c43bc
SHA512 23504a336dff888eeb9fd84d85dcf7ee434c41db8eec701473f06df06a62683a947d836b81f7a8de923b682cac769a2566870392ae5b834b9a48cb20e35e95e8

memory/6036-69-0x00007FFAF00A0000-0x00007FFAF059E000-memory.dmp

C:\Users\Admin\AppData\Local\FortniteBurger2\Run\2403bb5a8f8f4d16bd8051d7d0404996.exe

MD5 5a16b8338fe420c587114c6f877d80cf
SHA1 e7e8506e12b50fdc80831fbca2d0e47262a3c058
SHA256 ad9a50e9f323843ffed7af90be9f7398b785325d39e1fcf6a2d2f7eadc62b44d
SHA512 f2daefdb9b8fc61098bdf500cf986a88d96894a2c0e98af1a3b15989baeed49beff46b9867c49aa2b3b4ea0204080d907986822b79810487c4867bef52fe3137

memory/6036-112-0x00007FFAF00A0000-0x00007FFAF059E000-memory.dmp

memory/3972-137-0x00007FFAF00A0000-0x00007FFAF059E000-memory.dmp

memory/3972-156-0x00007FFAF00A0000-0x00007FFAF059E000-memory.dmp

C:\Users\Admin\AppData\Local\FortniteBurger2\Profiles\MarketWithPerks.json

MD5 a8a705381e73bc7beba7532818e2767b
SHA1 386b8e6b4dae114414ba91e44c346275864ae6b6
SHA256 796242d7cddd0c96e1c05f93406ec5c84d80033b97b4e02da5526a98fb9c0808
SHA512 7645e7e642c48c19e73c84f2bcdd5b1ad6f29f280369baa26363a217a0dd9bd6db890e73a166fc1a66983b210a32b94971c22301605ce04e7e52f476b80d793c