General

  • Target

    b859d4b635e94a5511f9fa493c8b220bfb9859a2f94649be148cd38b53a4da35

  • Size

    963KB

  • Sample

    220314-v3d46aadb9

  • MD5

    a38a7e72a110324734a6a1f76e2c6e00

  • SHA1

    849d24d21ac83486ce9ea730d97993e08d9733df

  • SHA256

    b859d4b635e94a5511f9fa493c8b220bfb9859a2f94649be148cd38b53a4da35

  • SHA512

    faf091768e2057b36c458b84c8024c4d6ee8ea61ea49e3fab3258c9e977a8a22360ebc85a054adbbec6a8fba7aaf1e9b708ef719fc6fd113a2cb058e8744c894

Malware Config

Targets

    • Target

      b859d4b635e94a5511f9fa493c8b220bfb9859a2f94649be148cd38b53a4da35

    • Size

      963KB

    • MD5

      a38a7e72a110324734a6a1f76e2c6e00

    • SHA1

      849d24d21ac83486ce9ea730d97993e08d9733df

    • SHA256

      b859d4b635e94a5511f9fa493c8b220bfb9859a2f94649be148cd38b53a4da35

    • SHA512

      faf091768e2057b36c458b84c8024c4d6ee8ea61ea49e3fab3258c9e977a8a22360ebc85a054adbbec6a8fba7aaf1e9b708ef719fc6fd113a2cb058e8744c894

    • DiamondFox

      DiamondFox is a multipurpose botnet with many capabilities.

    • DiamondFox payload

      Detects DiamondFox payload in file/memory.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks