General
-
Target
foo.exe
-
Size
212KB
-
Sample
210525-ws3nal4ezj
-
MD5
433d77782664455b950e1508c0787f1a
-
SHA1
181103f2b8dd9a8bf954f22670f08c7193cb8e8f
-
SHA256
e3be8bb6d3f2e7bd860e41df6a60e1a5698bec5670ea127b627ef8b16fb0d254
-
SHA512
5c8da80d17e2a023d2bb2621ec14d97412fd02a9c645044e1c4818c4e55c29e8fc5ad4cae30817d4e6e45d52e3fdd44b8581be0e411b74fff26e7ae44008d390
Static task
static1
Behavioral task
behavioral1
Sample
foo.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
foo.exe
Resource
win10v20210408
Malware Config
Targets
-
-
Target
foo.exe
-
Size
212KB
-
MD5
433d77782664455b950e1508c0787f1a
-
SHA1
181103f2b8dd9a8bf954f22670f08c7193cb8e8f
-
SHA256
e3be8bb6d3f2e7bd860e41df6a60e1a5698bec5670ea127b627ef8b16fb0d254
-
SHA512
5c8da80d17e2a023d2bb2621ec14d97412fd02a9c645044e1c4818c4e55c29e8fc5ad4cae30817d4e6e45d52e3fdd44b8581be0e411b74fff26e7ae44008d390
Score10/10-
DiamondFox payload
Detects DiamondFox payload in file/memory.
-
Executes dropped EXE
-
Loads dropped DLL
-