General

  • Target

    cb1392724a6262a0994e00fc192515232bf59c4edf3c000f9215bf738d348e02

  • Size

    1.9MB

  • MD5

    24734ef952fe363415cd4c2f7322276f

  • SHA1

    27085a2d191be20804ccae5fff2bde9d353ff506

  • SHA256

    cb1392724a6262a0994e00fc192515232bf59c4edf3c000f9215bf738d348e02

  • SHA512

    c94ff707f920898a03f4c6beb3bf7beea4799d282faec9bc48608b5670480ac3495dd2f4376b7bb0f97056fe89322a93ccae113d6a0fca6a557fe83de52aaec4

  • SSDEEP

    24576:yMWHiFDV07ECXo4tu619SbX7ZwwjeJJV+CBqAKngOu8LNZZ/LJCPlyPlVzOCr:LJ6qbroCnlu8jhL0PMtVSCr

Score
10/10

Malware Config

Signatures

  • DiamondFox stealer 1 IoCs
  • Diamondfox family
  • Patched UPX-packed file 1 IoCs

    Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

Files

  • cb1392724a6262a0994e00fc192515232bf59c4edf3c000f9215bf738d348e02
    .elf linux x64