MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f568bf60419b138108940953ad0786358b89607db140c3a109f335a12f4c1b72. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DiamondFox


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: f568bf60419b138108940953ad0786358b89607db140c3a109f335a12f4c1b72
SHA3-384 hash: 6c4fba31d2aebf1b23e12477d9468969285c19e5959f1d2eaa2f41a96f3df084eba080ae9789fad277d2d422219aa982
SHA1 hash: 26316a6cd2e656ccae27f352da375b6028efd8cf
MD5 hash: 2968feea18f8b80dd184794dd697ab33
humanhash: artist-three-mirror-indigo
File name:arty.exe
Download: download sample
Signature DiamondFox
File size:242'688 bytes
First seen:2020-04-16 14:54:27 UTC
Last seen:2020-04-16 17:39:52 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 0ec15c646d304efa4b9e6e84af834529 (1 x DiamondFox)
ssdeep 3072:A+saQhdmWgoC8Tw1pO1Yc/LFGmAzGOLC8ch9:5+Lk2wg1TAqu8
Threatray 110 similar samples on MalwareBazaar
TLSH 3D348D2134D48072F6AFD63489B5DAB54A7ABC764F6471CB3BF91A3A2F342D18630346
Reporter abuse_ch
Tags:DiamondFox exe


Avatar
abuse_ch
DiamondFox malspam, various sending IPs. Example:

HELO: replysstrangesecurenetwork.us
Sending IP: 185.17.122.106
From: "Brio Trade Ltd" <ratification@replysstrangesecuretoday.us>
Subhect: Invoice pending payment
Attachment: invoice_9.xls

DiamondFox payload URL:
http://217.8.117.60/arty.exe

DiamondFox C2:
http://217.8.117.60/mh/gate.php

Intelligence


File Origin
# of uploads :
2
# of downloads :
113
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Kryptik
Status:
Malicious
First seen:
2020-04-16 15:35:36 UTC
File Type:
PE (Exe)
Extracted files:
19
AV detection:
26 of 31 (83.87%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

DiamondFox

Executable exe f568bf60419b138108940953ad0786358b89607db140c3a109f335a12f4c1b72

(this sample)

  
Delivery method
Distributed via web download

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetStartupInfoW
KERNEL32.dll::GetCommandLineA

Comments