General

  • Target

    new.exe

  • Size

    204KB

  • Sample

    220327-th8mlaefbl

  • MD5

    c967f5dec6b865b96fc2d2bd1e6b4198

  • SHA1

    43b08a681af8f9b4d3a55993151a1a92d47826c1

  • SHA256

    0355b561e5952f8392e7b2bedcf5b18a169f95aeb7ea44d75ba1082664a63173

  • SHA512

    7c15efc4919cfe6b53dbc2b486970d834d6acd293a02c1572e79294e6b06f893f152caaf485bbc56029570f1af1bd04686b1216411c0002c4ecac2d0ab2753f0

Malware Config

Targets

    • Target

      new.exe

    • Size

      204KB

    • MD5

      c967f5dec6b865b96fc2d2bd1e6b4198

    • SHA1

      43b08a681af8f9b4d3a55993151a1a92d47826c1

    • SHA256

      0355b561e5952f8392e7b2bedcf5b18a169f95aeb7ea44d75ba1082664a63173

    • SHA512

      7c15efc4919cfe6b53dbc2b486970d834d6acd293a02c1572e79294e6b06f893f152caaf485bbc56029570f1af1bd04686b1216411c0002c4ecac2d0ab2753f0

    • DiamondFox

      DiamondFox is a multipurpose botnet with many capabilities.

    • suricata: ET MALWARE Generic gate .php GET with minimal headers

      suricata: ET MALWARE Generic gate .php GET with minimal headers

    • DiamondFox payload

      Detects DiamondFox payload in file/memory.

    • Executes dropped EXE

MITRE ATT&CK Matrix

Tasks