General

  • Target

    FortniteBurger_v2.exe

  • Size

    12.1MB

  • Sample

    250524-qvyflsylv5

  • MD5

    4aaae382df5989f65fb9c54b51119beb

  • SHA1

    8b05f99057d92cb65edeefab495140d7b2a0f7a3

  • SHA256

    443a041f8fefde88fcfcc5e3395a30e25b35c3566f2ed0ebadcb41f1f4f0c4ef

  • SHA512

    fae5c82bae72b246c568a8217a7c8bd39e2e88eef58a25bb1bba2acebcf4188026bb326c12002297733104328f4a0cc23b65beb4ae363d4c4b50ff9d4fd506ea

  • SSDEEP

    98304:6VBX39qm/Y3mDDDy/WTAjM7iHbaldePP84H+4jcFYT1iJFz8tgPP:6VBXA3mDDDy/WTALOg8o+9qpiJFz8tgP

Score
10/10

Malware Config

Targets

    • Target

      FortniteBurger_v2.exe

    • Size

      12.1MB

    • MD5

      4aaae382df5989f65fb9c54b51119beb

    • SHA1

      8b05f99057d92cb65edeefab495140d7b2a0f7a3

    • SHA256

      443a041f8fefde88fcfcc5e3395a30e25b35c3566f2ed0ebadcb41f1f4f0c4ef

    • SHA512

      fae5c82bae72b246c568a8217a7c8bd39e2e88eef58a25bb1bba2acebcf4188026bb326c12002297733104328f4a0cc23b65beb4ae363d4c4b50ff9d4fd506ea

    • SSDEEP

      98304:6VBX39qm/Y3mDDDy/WTAjM7iHbaldePP84H+4jcFYT1iJFz8tgPP:6VBXA3mDDDy/WTALOg8o+9qpiJFz8tgP

    Score
    10/10
    • Detect ZGRat V2

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Zgrat family

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v16

Tasks