File name:

Fortnite Aimbot v7.5.zip

Full analysis: https://app.any.run/tasks/df872d72-0d8c-407e-9b0a-fc7f7a665762
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: April 18, 2021, 21:17:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
redline
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

F3282FC5D9D29EA5A20126EAAC7CAA5A

SHA1:

9B71602579EBE8150174B120B5C94E6B0E747260

SHA256:

59CD1C6622C88DDCEDB1397ECDA2D1F943A64DA8A5036F6DD6ACDF927BD2F991

SSDEEP:

98304:6lXdCxF+pZzw6psewUTqgDC7wiHk0tvIgTNa9bnwkSC09LWa3rN:aXdCxFqZpsernok0vJCsLFqa3rN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Fortnite Aimbot.exe (PID: 2400)
      • Fortnite Aimbot (2).exe (PID: 2524)
      • miz.exe (PID: 1784)
    • REDLINE was detected

      • AddInProcess32.exe (PID: 2456)
    • Changes settings of System certificates

      • miz.exe (PID: 1784)
    • Drops executable file immediately after starts

      • Fortnite Aimbot.exe (PID: 2400)
    • Steals credentials from Web Browsers

      • AddInProcess32.exe (PID: 2456)
    • Actions looks like stealing of personal data

      • AddInProcess32.exe (PID: 2456)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1512)
      • Fortnite Aimbot.exe (PID: 2400)
    • Drops a file with too old compile date

      • WinRAR.exe (PID: 1512)
      • Fortnite Aimbot.exe (PID: 2400)
    • Drops a file that was compiled in debug mode

      • Fortnite Aimbot.exe (PID: 2400)
    • Adds / modifies Windows certificates

      • miz.exe (PID: 1784)
    • Reads Environment values

      • AddInProcess32.exe (PID: 2456)
    • Reads the cookies of Google Chrome

      • AddInProcess32.exe (PID: 2456)
    • Reads the cookies of Mozilla Firefox

      • AddInProcess32.exe (PID: 2456)
    • Searches for installed software

      • AddInProcess32.exe (PID: 2456)
  • INFO

    • Manual execution by user

      • Fortnite Aimbot.exe (PID: 2400)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: aibox.resources
ZipUncompressedSize: 1205
ZipCompressedSize: 539
ZipCRC: 0x3da23c71
ZipModifyDate: 2020:04:30 04:05:05
ZipCompression: Deflated
ZipBitFlag: 0x0002
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
42
Monitored processes
5
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start winrar.exe fortnite aimbot.exe miz.exe fortnite aimbot (2).exe no specs #REDLINE addinprocess32.exe

Process information

PID
CMD
Path
Indicators
Parent process
1512"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Fortnite Aimbot v7.5.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1784"C:\Users\admin\AppData\Local\Temp\miz.exe" C:\Users\admin\AppData\Local\Temp\miz.exe
Fortnite Aimbot.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\miz.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2400"C:\Users\admin\Desktop\Fortnite Aimbot.exe" C:\Users\admin\Desktop\Fortnite Aimbot.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\fortnite aimbot.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shfolder.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2456C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
miz.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
AddInProcess.exe
Exit code:
0
Version:
4.7.3062.0 built by: NET472REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\addinprocess32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2524"C:\Users\admin\AppData\Local\Temp\Fortnite Aimbot (2).exe" C:\Users\admin\AppData\Local\Temp\Fortnite Aimbot (2).exeFortnite Aimbot.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Fortnite Aimbot
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\fortnite aimbot (2).exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
1 506
Read events
1 424
Write events
81
Delete events
1

Modification events

(PID) Process:(1512) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(1512) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(1512) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13D\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1512) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13D\52C64B7E
Operation:writeName:@C:\Windows\system32\NetworkExplorer.dll,-1
Value:
Network
(PID) Process:(1512) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Fortnite Aimbot v7.5.zip
(PID) Process:(1512) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1512) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1512) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1512) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1512) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13D\52C64B7E
Operation:writeName:@C:\Windows\System32\msxml3r.dll,-1
Value:
XML Document
Executable files
3
Suspicious files
0
Text files
7
Unknown types
1

Dropped files

PID
Process
Filename
Type
2456AddInProcess32.exeC:\Users\admin\AppData\Local\Temp\tmpCEC.tmp
MD5:
SHA256:
2456AddInProcess32.exeC:\Users\admin\AppData\Local\Temp\tmpCED.tmp
MD5:
SHA256:
2456AddInProcess32.exeC:\Users\admin\AppData\Local\Temp\tmpCFE.tmp
MD5:
SHA256:
2456AddInProcess32.exeC:\Users\admin\AppData\Local\Temp\tmpD0E.tmp
MD5:
SHA256:
2456AddInProcess32.exeC:\Users\admin\AppData\Local\Temp\tmpD2F.tmp
MD5:
SHA256:
2456AddInProcess32.exeC:\Users\admin\AppData\Local\Temp\tmpD30.tmp
MD5:
SHA256:
2456AddInProcess32.exeC:\Users\admin\AppData\Local\Temp\tmpD40.tmp
MD5:
SHA256:
2456AddInProcess32.exeC:\Users\admin\AppData\Local\Temp\tmpD41.tmp
MD5:
SHA256:
2456AddInProcess32.exeC:\Users\admin\AppData\Local\Temp\tmpD42.tmp
MD5:
SHA256:
2456AddInProcess32.exeC:\Users\admin\AppData\Local\Temp\tmpD43.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
4
DNS requests
2
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1784
miz.exe
GET
200
81.177.140.201:80
http://03g.git4you.ru/SystemDataOdbcODBCSQLPARAMP
RU
text
303 Kb
suspicious
2456
AddInProcess32.exe
POST
200
185.244.216.74:1337
http://185.244.216.74:1337/
unknown
text
150 b
malicious
2456
AddInProcess32.exe
POST
200
185.244.216.74:1337
http://185.244.216.74:1337/
unknown
text
4.65 Kb
malicious
2456
AddInProcess32.exe
POST
200
185.244.216.74:1337
http://185.244.216.74:1337/
unknown
text
261 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2456
AddInProcess32.exe
185.244.216.74:1337
malicious
2456
AddInProcess32.exe
104.26.12.31:443
api.ip.sb
Cloudflare Inc
US
suspicious
1784
miz.exe
81.177.140.201:80
03g.git4you.ru
JSC RTComm.RU
RU
suspicious
1784
miz.exe
81.177.140.201:443
03g.git4you.ru
JSC RTComm.RU
RU
suspicious

DNS requests

Domain
IP
Reputation
03g.git4you.ru
  • 81.177.140.201
suspicious
api.ip.sb
  • 104.26.12.31
  • 172.67.75.172
  • 104.26.13.31
whitelisted

Threats

PID
Process
Class
Message
2456
AddInProcess32.exe
A Network Trojan was detected
STEALER [PTsecurity] Spider.Ransom
2456
AddInProcess32.exe
A Network Trojan was detected
STEALER [PTsecurity] Spider.Ransom
2456
AddInProcess32.exe
Generic Protocol Command Decode
SURICATA HTTP unable to match response to request
5 ETPRO signatures available at the full report
No debug info