General

  • Target

    new.exe

  • Size

    204KB

  • Sample

    220327-tr3gyaefbr

  • MD5

    8a40b88f514ef21f74052d22e2d98750

  • SHA1

    524e636f22bb8a5c2f7947727d5f91dd3dd05972

  • SHA256

    ee43e21fbfb66eba6ef729b0f660f8b9110c8b2d22fa8c34de4a57cb38d70f86

  • SHA512

    cfb5416c676a84fdc291a548222650701d62832100cd5d08fb480b585ea1e76a4b2dc4b181e3ae2916a2b91a6ab09bc6178aec4d2c023396fb596d17b80cc215

Malware Config

Targets

    • Target

      new.exe

    • Size

      204KB

    • MD5

      8a40b88f514ef21f74052d22e2d98750

    • SHA1

      524e636f22bb8a5c2f7947727d5f91dd3dd05972

    • SHA256

      ee43e21fbfb66eba6ef729b0f660f8b9110c8b2d22fa8c34de4a57cb38d70f86

    • SHA512

      cfb5416c676a84fdc291a548222650701d62832100cd5d08fb480b585ea1e76a4b2dc4b181e3ae2916a2b91a6ab09bc6178aec4d2c023396fb596d17b80cc215

    • DiamondFox

      DiamondFox is a multipurpose botnet with many capabilities.

    • suricata: ET MALWARE Generic gate .php GET with minimal headers

      suricata: ET MALWARE Generic gate .php GET with minimal headers

    • DiamondFox payload

      Detects DiamondFox payload in file/memory.

    • Executes dropped EXE

MITRE ATT&CK Matrix

Tasks