General

  • Target

    abfadb6686459f69a92ede367a2713fc2a1289ebe0c8596964682e4334cee553

  • Size

    496KB

  • Sample

    220128-xnavasbdb7

  • MD5

    f39e228cfdaf4abc6c505dcff60f8dc0

  • SHA1

    88337abf7b9ecd9396a384c4878e3e8674783101

  • SHA256

    abfadb6686459f69a92ede367a2713fc2a1289ebe0c8596964682e4334cee553

  • SHA512

    cf3cd7b9dfd867702b7483dd3301e1da2fcd2bd2d7c0eee27cb7faff30c468e029a27816ded3cf01b3776d2157bd49d839dde2f17ec01b4c5d900d3637f8e415

Malware Config

Targets

    • Target

      abfadb6686459f69a92ede367a2713fc2a1289ebe0c8596964682e4334cee553

    • Size

      496KB

    • MD5

      f39e228cfdaf4abc6c505dcff60f8dc0

    • SHA1

      88337abf7b9ecd9396a384c4878e3e8674783101

    • SHA256

      abfadb6686459f69a92ede367a2713fc2a1289ebe0c8596964682e4334cee553

    • SHA512

      cf3cd7b9dfd867702b7483dd3301e1da2fcd2bd2d7c0eee27cb7faff30c468e029a27816ded3cf01b3776d2157bd49d839dde2f17ec01b4c5d900d3637f8e415

    • DiamondFox

      DiamondFox is a multipurpose botnet with many capabilities.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Deletes itself

    • Drops startup file

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Modify Registry

5
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Tasks