General

  • Target

    DiamondExternal.exe

  • Size

    14.5MB

  • Sample

    240119-qv4ydsffa3

  • MD5

    37c7fad6f12ac338d5e5186b17db9156

  • SHA1

    5ab8373f76001ac8a8afefcb4121886a6b296406

  • SHA256

    b4fe190c272a92fb7b80e638bad1f08ba6f62b08854845aef654ef3907fb6c6c

  • SHA512

    fecbd986d473ffce24fa10753c95d1c46fec82915f2574c1c3ec169dd474110fd86b6f0b2618cde84cb280960cf3898ba53ca2df999cf391079d0eec5890f665

  • SSDEEP

    196608:qmEkv0sKYu/PaQ+DuXJpjbiDfyGgMwBdnpkYRMC8NJqyKGcl/Y/a5U966:vEkZQTiDfDgMc6Zrqz/uakT

Malware Config

Targets

    • Target

      DiamondExternal.exe

    • Size

      14.5MB

    • MD5

      37c7fad6f12ac338d5e5186b17db9156

    • SHA1

      5ab8373f76001ac8a8afefcb4121886a6b296406

    • SHA256

      b4fe190c272a92fb7b80e638bad1f08ba6f62b08854845aef654ef3907fb6c6c

    • SHA512

      fecbd986d473ffce24fa10753c95d1c46fec82915f2574c1c3ec169dd474110fd86b6f0b2618cde84cb280960cf3898ba53ca2df999cf391079d0eec5890f665

    • SSDEEP

      196608:qmEkv0sKYu/PaQ+DuXJpjbiDfyGgMwBdnpkYRMC8NJqyKGcl/Y/a5U966:vEkZQTiDfDgMc6Zrqz/uakT

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks