MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 51c2ff5ec011508a2071d7a4272d4391080143fedc2166474d51913753eb8344. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DiamondFox


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 51c2ff5ec011508a2071d7a4272d4391080143fedc2166474d51913753eb8344
SHA3-384 hash: c20052f56bc95a8f8db4650fa2383b7eff1f4792f5e8a48bcb74139169cbbf29a407f688952c55143e24a10366e8134c
SHA1 hash: 13fde0365047802c39c0d5a29f43075d18823acd
MD5 hash: 1956f436a6ec9ec3696d8373d36a1228
humanhash: echo-wyoming-item-sierra
File name:51c2ff5ec011508a2071d7a4272d4391080143fedc2166474d51913753eb8344
Download: download sample
Signature DiamondFox
File size:307'200 bytes
First seen:2021-02-13 08:02:20 UTC
Last seen:2021-02-13 09:54:43 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 76afaf064c1b22936d67dd04527e716f (1 x DiamondFox)
ssdeep 6144:rZVYU0jsRplka0kEsUPbIUdziS4IFBjOTBRVvW4Ac1upuFd:rZVYEvikxkb9DHFBjOT/BWo9Fd
Threatray 545 similar samples on MalwareBazaar
TLSH FE649E43D78905FADAD50E30489793BEF973A614871485DB97E8293388227E06E7F2F4
Reporter JAMESWT_WT
Tags:DiamondFox

Intelligence


File Origin
# of uploads :
2
# of downloads :
317
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
1b59_029A0000.bin
Verdict:
Suspicious activity
Analysis date:
2021-02-09 16:10:27 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Creating a process with a hidden window
DNS request
Sending a UDP request
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Result
Threat name:
Diamondfox MailPassView
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to inject code into remote processes
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found C&C like URL pattern
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes)
Sample uses process hollowing technique
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Yara detected BrowsingHistoryView browser history reader tool
Yara detected Diamondfox
Yara detected MailPassView
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 352713 Sample: plA3zA7OK7 Startdate: 13/02/2021 Architecture: WINDOWS Score: 100 40 outarcubleauded.xyz 2->40 42 prda.aadg.msidentity.com 2->42 62 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->62 64 Antivirus / Scanner detection for submitted sample 2->64 66 Multi AV Scanner detection for submitted file 2->66 68 7 other signatures 2->68 9 plA3zA7OK7.exe 3 2->9         started        signatures3 process4 file5 36 C:\Users\user\...\MicrosoftEdgeCPS.exe, PE32 9->36 dropped 38 C:\...\MicrosoftEdgeCPS.exe:Zone.Identifier, ASCII 9->38 dropped 70 Contains functionality to inject code into remote processes 9->70 13 MicrosoftEdgeCPS.exe 20 9->13         started        signatures6 process7 dnsIp8 44 outarcubleauded.xyz 35.204.201.144, 49736, 49743, 49745 GOOGLEUS United States 13->44 46 scorendumistiga.online 13->46 48 3 other IPs or domains 13->48 72 Antivirus detection for dropped file 13->72 74 Multi AV Scanner detection for dropped file 13->74 76 Detected unpacking (changes PE section rights) 13->76 78 7 other signatures 13->78 17 WMIC.exe 1 13->17         started        20 MicrosoftEdgeCPS.exe 13->20         started        22 MicrosoftEdgeCPS.exe 13->22         started        24 10 other processes 13->24 signatures9 process10 signatures11 50 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 17->50 52 Queries sensitive service information (via WMI, Win32_LogicalDisk, often done to detect sandboxes) 17->52 26 conhost.exe 17->26         started        54 Tries to steal Instant Messenger accounts or passwords 20->54 56 Tries to steal Mail credentials (via file access) 20->56 58 Tries to harvest and steal browser information (history, passwords, etc) 22->58 60 Tries to harvest and steal ftp login credentials 24->60 28 conhost.exe 24->28         started        30 conhost.exe 24->30         started        32 conhost.exe 24->32         started        34 4 other processes 24->34 process12
Threat name:
Win32.Trojan.Fugrafa
Status:
Malicious
First seen:
2021-02-10 18:03:00 UTC
File Type:
PE (Exe)
AV detection:
32 of 48 (66.67%)
Threat level:
  5/5
Result
Malware family:
diamondfox
Score:
  10/10
Tags:
family:diamondfox botnet discovery spyware stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Suspicious use of SetThreadContext
Checks installed software on the system
Loads dropped DLL
Reads user/profile data of web browsers
Executes dropped EXE
DiamondFox payload
NirSoft WebBrowserPassView
Nirsoft
DiamondFox
Unpacked files
SH256 hash:
51c2ff5ec011508a2071d7a4272d4391080143fedc2166474d51913753eb8344
MD5 hash:
1956f436a6ec9ec3696d8373d36a1228
SHA1 hash:
13fde0365047802c39c0d5a29f43075d18823acd
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments