General
-
Target
http://148.163.12.101/WMndFrdk?keyword=Others&cost=0.00040&ad_campaign_id=262704&source=0
-
Sample
201117-h9cj6sz8s6
Static task
static1
URLScan task
urlscan1
Sample
http://148.163.12.101/WMndFrdk?keyword=Others&cost=0.00040&ad_campaign_id=262704&source=0
Behavioral task
behavioral1
Sample
http://148.163.12.101/WMndFrdk?keyword=Others&cost=0.00040&ad_campaign_id=262704&source=0
Resource
win7v20201028
Malware Config
Extracted
diamondfox
https://www.datanalysis.club/ms/gate.php
https://www.datanalysis.site/ms/gate.php
https://www.datanalysis.space/ms/gate.php
cBFxpht5aCf0jy4gnUs3JgtqCB2O2tWJ
Targets
-
-
Target
http://148.163.12.101/WMndFrdk?keyword=Others&cost=0.00040&ad_campaign_id=262704&source=0
Score10/10-
DiamondFox payload
Detects DiamondFox payload in file/memory.
-
Blacklisted process makes network request
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-