General

  • Target

    e833b7c2b0a0e1b3d9914a3e80e7738eab7453685d864e7a9668387dd0a247d0

  • Size

    463KB

  • Sample

    220414-hmttfsadc2

  • MD5

    9f9b7810b1d76a3c81562332be2a356f

  • SHA1

    979b9b64fbcfe457b89f264de828f3518cd440f3

  • SHA256

    e833b7c2b0a0e1b3d9914a3e80e7738eab7453685d864e7a9668387dd0a247d0

  • SHA512

    6af50acdff639a7df9e16f682c54fa410fe3e8333a92fe529d9ebc81e652f3ac60df030e81d208466af40a4dc57b75f68171c476723007e15adfc2c184c2fedd

Malware Config

Targets

    • Target

      ISF-10+2 ?? WTXLAX200007.scr

    • Size

      811KB

    • MD5

      ab74af82928f328979d85af5db7debab

    • SHA1

      07476d19fa25fafdec37767eb06ca91a4caf2ee9

    • SHA256

      8616545829272fd918765d945bb44e610852b995be21965577b77cfea4868007

    • SHA512

      87d6658f8a402f65897a1b83289b7bbbdc7be14f7632262175c06b34f7b6337048618c59b12de7a7c422b62ff7816bdc7f14371050bb44dc5430dd3e2fbff156

    • DiamondFox

      DiamondFox is a multipurpose botnet with many capabilities.

    • DiamondFox payload

      Detects DiamondFox payload in file/memory.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks