General
-
Target
11bb3a2ce35c541f895c207f6c324ba08e87e54a0fe543451b96663284524028
-
Size
635KB
-
Sample
220222-wsjgkacac5
-
MD5
fadbbacbf1800d075f59c6128a521229
-
SHA1
33e59cc481259ec3af5001edc5921b338f410a9a
-
SHA256
11bb3a2ce35c541f895c207f6c324ba08e87e54a0fe543451b96663284524028
-
SHA512
97d52b3a0ce933b63dbab6830be67b35a1cd017e17beee794c3100f39ba19b516d1b59fca07b19ee1941a374c44c6fe590fa93deabe84d314bae4ae51840b3b2
Static task
static1
Behavioral task
behavioral1
Sample
11bb3a2ce35c541f895c207f6c324ba08e87e54a0fe543451b96663284524028.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
11bb3a2ce35c541f895c207f6c324ba08e87e54a0fe543451b96663284524028.exe
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
11bb3a2ce35c541f895c207f6c324ba08e87e54a0fe543451b96663284524028
-
Size
635KB
-
MD5
fadbbacbf1800d075f59c6128a521229
-
SHA1
33e59cc481259ec3af5001edc5921b338f410a9a
-
SHA256
11bb3a2ce35c541f895c207f6c324ba08e87e54a0fe543451b96663284524028
-
SHA512
97d52b3a0ce933b63dbab6830be67b35a1cd017e17beee794c3100f39ba19b516d1b59fca07b19ee1941a374c44c6fe590fa93deabe84d314bae4ae51840b3b2
Score10/10-
DiamondFox payload
Detects DiamondFox payload in file/memory.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-