General

  • Target

    a6375022953679ad82fc634b471c5b9b7911b47453e8d155469f24ee20db89dc.bin

  • Size

    90KB

  • MD5

    387fd80a5602adc3dd4b2d0197a289de

  • SHA1

    b903356e121f997a49759b306533a7ee8880b13b

  • SHA256

    a6375022953679ad82fc634b471c5b9b7911b47453e8d155469f24ee20db89dc

  • SHA512

    3d8d5f437df25d23dbba75c4be7d252bdda32e84c1c55eee10877d38a178aed5beae6dbb56c1f0aa7ba9a94c020dc0705584bdc13bfe61d0af4de9cc76afa23e

Score
10/10

Malware Config

Extracted

Family

diamondfox

C2

http://dong7707.at/spt/gate.php

Mutex

YxgnVQE8PlVLcflLlW4ai9xmX2DERyF4

xor.plain

Signatures

  • DiamondFox payload 1 IoCs

    Detects DiamondFox payload in file/memory.

  • Diamondfox family

Files

  • a6375022953679ad82fc634b471c5b9b7911b47453e8d155469f24ee20db89dc.bin
    .exe windows x86