General

  • Target

    new.exe

  • Size

    204KB

  • Sample

    220326-p2k87ahdcr

  • MD5

    83ad1aef29c044fc8a630711be34b420

  • SHA1

    dda0ae0fe60b1322aa99151472d1d98518238be9

  • SHA256

    d94747c37a0fc39c242375bb649d146a469ed3d49771048c024f96170ad5d85a

  • SHA512

    e6951c48e00fb41cae729240c7829cad268627f141ba22178a8d2d6b717bb387d6b7723f03b575f0b596e77466ddd7ab83be284e78e2588edc8f1981cf543383

Malware Config

Targets

    • Target

      new.exe

    • Size

      204KB

    • MD5

      83ad1aef29c044fc8a630711be34b420

    • SHA1

      dda0ae0fe60b1322aa99151472d1d98518238be9

    • SHA256

      d94747c37a0fc39c242375bb649d146a469ed3d49771048c024f96170ad5d85a

    • SHA512

      e6951c48e00fb41cae729240c7829cad268627f141ba22178a8d2d6b717bb387d6b7723f03b575f0b596e77466ddd7ab83be284e78e2588edc8f1981cf543383

    • DiamondFox

      DiamondFox is a multipurpose botnet with many capabilities.

    • suricata: ET MALWARE Generic gate .php GET with minimal headers

      suricata: ET MALWARE Generic gate .php GET with minimal headers

    • DiamondFox payload

      Detects DiamondFox payload in file/memory.

    • Executes dropped EXE

MITRE ATT&CK Matrix

Tasks