General
-
Target
DiamondExternal.exe
-
Size
14.5MB
-
Sample
240119-qv4ydsffa3
-
MD5
37c7fad6f12ac338d5e5186b17db9156
-
SHA1
5ab8373f76001ac8a8afefcb4121886a6b296406
-
SHA256
b4fe190c272a92fb7b80e638bad1f08ba6f62b08854845aef654ef3907fb6c6c
-
SHA512
fecbd986d473ffce24fa10753c95d1c46fec82915f2574c1c3ec169dd474110fd86b6f0b2618cde84cb280960cf3898ba53ca2df999cf391079d0eec5890f665
-
SSDEEP
196608:qmEkv0sKYu/PaQ+DuXJpjbiDfyGgMwBdnpkYRMC8NJqyKGcl/Y/a5U966:vEkZQTiDfDgMc6Zrqz/uakT
Malware Config
Targets
-
-
Target
DiamondExternal.exe
-
Size
14.5MB
-
MD5
37c7fad6f12ac338d5e5186b17db9156
-
SHA1
5ab8373f76001ac8a8afefcb4121886a6b296406
-
SHA256
b4fe190c272a92fb7b80e638bad1f08ba6f62b08854845aef654ef3907fb6c6c
-
SHA512
fecbd986d473ffce24fa10753c95d1c46fec82915f2574c1c3ec169dd474110fd86b6f0b2618cde84cb280960cf3898ba53ca2df999cf391079d0eec5890f665
-
SSDEEP
196608:qmEkv0sKYu/PaQ+DuXJpjbiDfyGgMwBdnpkYRMC8NJqyKGcl/Y/a5U966:vEkZQTiDfDgMc6Zrqz/uakT
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-