General

  • Target

    4c374a28f93443eddaeb03cb789b18e38b7e797620d06c17e83684884377f34b

  • Size

    524KB

  • Sample

    220418-krnjcahbfj

  • MD5

    fed8da31116c682583f8535307840f37

  • SHA1

    8fe062149c227c72f267b6e48249a63ae1e53c5b

  • SHA256

    4c374a28f93443eddaeb03cb789b18e38b7e797620d06c17e83684884377f34b

  • SHA512

    d73be00a35cd1bbcef7765c8fe3d7438ef360c897e0ccf97839d3953cb449b6c1be3536c28e49ef0921f893d4432c7957a3e8177a27dc68a8f66d5c510a6c375

Malware Config

Targets

    • Target

      4c374a28f93443eddaeb03cb789b18e38b7e797620d06c17e83684884377f34b

    • Size

      524KB

    • MD5

      fed8da31116c682583f8535307840f37

    • SHA1

      8fe062149c227c72f267b6e48249a63ae1e53c5b

    • SHA256

      4c374a28f93443eddaeb03cb789b18e38b7e797620d06c17e83684884377f34b

    • SHA512

      d73be00a35cd1bbcef7765c8fe3d7438ef360c897e0ccf97839d3953cb449b6c1be3536c28e49ef0921f893d4432c7957a3e8177a27dc68a8f66d5c510a6c375

    • DiamondFox

      DiamondFox is a multipurpose botnet with many capabilities.

    • DiamondFox payload

      Detects DiamondFox payload in file/memory.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks