General

  • Target

    Cheats Fortnite.exe

  • Size

    23.7MB

  • Sample

    240630-2m4hfa1emm

  • MD5

    378c4ed72845aba628706fa0f40a66a6

  • SHA1

    26229a255805494f2009447ca425f8000224f8b1

  • SHA256

    1e96fef78ab6d102d8e670419b2aa06afc1a84a2e3f5bd276e4373a9f6433a85

  • SHA512

    5b0f22d92fd4464f3d8bded5e792ac401c68a5a296f98915854a692a041c0364825478dda2a02a53958aba075b1cb2fff2cb967b7487203789426d0063aed9d2

  • SSDEEP

    393216:xqPnLFXlrnu7n0jcEQDw20DOETgsvcGfVgT29sDpMpDs4IspJdGwXEBus:YPLFXN8icEQDwqED0wNRGwXY

Malware Config

Targets

    • Target

      Cheats Fortnite.exe

    • Size

      23.7MB

    • MD5

      378c4ed72845aba628706fa0f40a66a6

    • SHA1

      26229a255805494f2009447ca425f8000224f8b1

    • SHA256

      1e96fef78ab6d102d8e670419b2aa06afc1a84a2e3f5bd276e4373a9f6433a85

    • SHA512

      5b0f22d92fd4464f3d8bded5e792ac401c68a5a296f98915854a692a041c0364825478dda2a02a53958aba075b1cb2fff2cb967b7487203789426d0063aed9d2

    • SSDEEP

      393216:xqPnLFXlrnu7n0jcEQDw20DOETgsvcGfVgT29sDpMpDs4IspJdGwXEBus:YPLFXN8icEQDwqED0wNRGwXY

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Command and Control

Web Service

1
T1102

Tasks