General

  • Target

    31d0bdce494a1355821e8695c6fb4216173ccdeaf2e390e30b5222c15d485943

  • Size

    844KB

  • Sample

    220222-gt1pxaedfk

  • MD5

    77144c51787f2eb142c2b4772712dbc4

  • SHA1

    9a98a8e73bc7c77e4045c1e72011565d5d7a5759

  • SHA256

    31d0bdce494a1355821e8695c6fb4216173ccdeaf2e390e30b5222c15d485943

  • SHA512

    7e3805f42e9a1f867575b65c5b434a1a27ee528dfd8a635669695a8366c07a5c2ad031ce47781400e3725dc1d228b3cc1fc0388314bdfd9bf9677a56157ee44c

Malware Config

Targets

    • Target

      31d0bdce494a1355821e8695c6fb4216173ccdeaf2e390e30b5222c15d485943

    • Size

      844KB

    • MD5

      77144c51787f2eb142c2b4772712dbc4

    • SHA1

      9a98a8e73bc7c77e4045c1e72011565d5d7a5759

    • SHA256

      31d0bdce494a1355821e8695c6fb4216173ccdeaf2e390e30b5222c15d485943

    • SHA512

      7e3805f42e9a1f867575b65c5b434a1a27ee528dfd8a635669695a8366c07a5c2ad031ce47781400e3725dc1d228b3cc1fc0388314bdfd9bf9677a56157ee44c

    • DiamondFox

      DiamondFox is a multipurpose botnet with many capabilities.

    • DiamondFox payload

      Detects DiamondFox payload in file/memory.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks