Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7v20201028
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v20201028
0 signatures
0 seconds
General
-
Target
setup.zip
-
Size
32KB
-
MD5
df0f0251c43982d87f5b8a29f25f7810
-
SHA1
e08264c70d6bb92507b963ca733471621ec01acf
-
SHA256
4798591a79be1fe28b70af10883e655ee16ca90e858b0463154bccada7cb0fa4
-
SHA512
9f91c34d0c1897dab6afac95d484552f9af2635581fe6a2fd2f849ae1bd7806c0c75b6e57e45675426240a9b81616d711b27a9da5bf258651b820a053b7ddaf7
Score
10/10
Malware Config
Extracted
Family
diamondfox
C2
https://www.datanalysis.club/ms/gate.php
https://www.datanalysis.site/ms/gate.php
https://www.datanalysis.space/ms/gate.php
Mutex
cBFxpht5aCf0jy4gnUs3JgtqCB2O2tWJ
xor.plain
Signatures
-
DiamondFox payload 1 IoCs
Detects DiamondFox payload in file/memory.
resource yara_rule static1/unpack001/setup.exe diamondfox -
Diamondfox family
Files
-
setup.zip.zip
Password: infected
-
setup.exe.exe windows x86