General

  • Target

    955a4e645d54f9d0215da60e28d8cbe7127664a55871c40055a42da800fc50d9

  • Size

    185KB

  • Sample

    220503-a3h3wsgcdq

  • MD5

    52030482b9b1dee8ae1aea7b0046413f

  • SHA1

    8e39078bd8edb9607facd4014ebcf34f2a12728a

  • SHA256

    955a4e645d54f9d0215da60e28d8cbe7127664a55871c40055a42da800fc50d9

  • SHA512

    3052ab0331aca7831cbdbc165b7f2e1f8a4819343a8724fc20ac652a8c2695357d3fa1aecc01d95175e47bc9bde90c12005dd8fdf15fb4a88ed055010fb6a12f

Malware Config

Targets

    • Target

      955a4e645d54f9d0215da60e28d8cbe7127664a55871c40055a42da800fc50d9

    • Size

      185KB

    • MD5

      52030482b9b1dee8ae1aea7b0046413f

    • SHA1

      8e39078bd8edb9607facd4014ebcf34f2a12728a

    • SHA256

      955a4e645d54f9d0215da60e28d8cbe7127664a55871c40055a42da800fc50d9

    • SHA512

      3052ab0331aca7831cbdbc165b7f2e1f8a4819343a8724fc20ac652a8c2695357d3fa1aecc01d95175e47bc9bde90c12005dd8fdf15fb4a88ed055010fb6a12f

    • DiamondFox

      DiamondFox is a multipurpose botnet with many capabilities.

    • DiamondFox payload

      Detects DiamondFox payload in file/memory.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks