General
-
Target
FortniteBurger_v2.exe
-
Size
12.1MB
-
Sample
250602-vbxr7acm3z
-
MD5
ab3c04c57b45c6cf7c26e29927bf08bb
-
SHA1
d90b3ee235deaa17d040a765903d746109496e9b
-
SHA256
56301ff6ca34d34ebfa22c32c3410fe9a60182bd23361f2b8730bd39d3cc9cef
-
SHA512
88ca9e04b21a0190eb8679ce9dab1caf8946bb10715b7c745506587ea4ad6f53d1dd07e9995c6a85d7663ef0ab24f9905dacd747e4109855fc91495fda937be2
-
SSDEEP
98304:6iT+P9qm/Y3mDDDy/WTAjM7iHbaldePP84H+4jcFYT1iJFz8tgPC:6i2A3mDDDy/WTALOg8o+9qpiJFz8tgC
Static task
static1
Malware Config
Targets
-
-
Target
FortniteBurger_v2.exe
-
Size
12.1MB
-
MD5
ab3c04c57b45c6cf7c26e29927bf08bb
-
SHA1
d90b3ee235deaa17d040a765903d746109496e9b
-
SHA256
56301ff6ca34d34ebfa22c32c3410fe9a60182bd23361f2b8730bd39d3cc9cef
-
SHA512
88ca9e04b21a0190eb8679ce9dab1caf8946bb10715b7c745506587ea4ad6f53d1dd07e9995c6a85d7663ef0ab24f9905dacd747e4109855fc91495fda937be2
-
SSDEEP
98304:6iT+P9qm/Y3mDDDy/WTAjM7iHbaldePP84H+4jcFYT1iJFz8tgPC:6i2A3mDDDy/WTALOg8o+9qpiJFz8tgC
-
Detect ZGRat V2
-
Zgrat family
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-