General

  • Target

    11bb3a2ce35c541f895c207f6c324ba08e87e54a0fe543451b96663284524028

  • Size

    635KB

  • Sample

    220222-wsjgkacac5

  • MD5

    fadbbacbf1800d075f59c6128a521229

  • SHA1

    33e59cc481259ec3af5001edc5921b338f410a9a

  • SHA256

    11bb3a2ce35c541f895c207f6c324ba08e87e54a0fe543451b96663284524028

  • SHA512

    97d52b3a0ce933b63dbab6830be67b35a1cd017e17beee794c3100f39ba19b516d1b59fca07b19ee1941a374c44c6fe590fa93deabe84d314bae4ae51840b3b2

Malware Config

Targets

    • Target

      11bb3a2ce35c541f895c207f6c324ba08e87e54a0fe543451b96663284524028

    • Size

      635KB

    • MD5

      fadbbacbf1800d075f59c6128a521229

    • SHA1

      33e59cc481259ec3af5001edc5921b338f410a9a

    • SHA256

      11bb3a2ce35c541f895c207f6c324ba08e87e54a0fe543451b96663284524028

    • SHA512

      97d52b3a0ce933b63dbab6830be67b35a1cd017e17beee794c3100f39ba19b516d1b59fca07b19ee1941a374c44c6fe590fa93deabe84d314bae4ae51840b3b2

    • DiamondFox

      DiamondFox is a multipurpose botnet with many capabilities.

    • DiamondFox payload

      Detects DiamondFox payload in file/memory.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks