{"id":7255,"date":"2017-04-06T08:14:34","date_gmt":"2017-04-06T16:14:34","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/06\/news-1046\/"},"modified":"2017-04-06T08:14:34","modified_gmt":"2017-04-06T16:14:34","slug":"news-1046","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/04\/06\/news-1046\/","title":{"rendered":"Diamond Fox &#8211; part 2: let&#8217;s dive in the code"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 06 Apr 2017 15:00:30 +0000<\/strong><\/p>\n<p>In a\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/03\/diamond-fox-p1\/\" target=\"_blank\">previous post<\/a> we made an initial analysis of a Diamond Fox bot delivered by the Nebula Exploit Kit (more about the campaign can be found <a href=\"http:\/\/malware-traffic-analysis.net\/2017\/03\/02\/index.html\" target=\"_blank\">here<\/a>). We described the way to unpack the protection layer in order to get the core, written in Visual Basic, that can be decompiled. In this second part of the series, we will take a deeper look into the code and analyze the bot&#8217;s features and code design.<\/p>\n<h3>Analyzed samples<\/h3>\n<p><a href=\"https:\/\/www.virustotal.com\/en\/file\/92b449d5932fd42a5040b26e2a849aea3deb04ae0c4e400e6ddf13acd12a94e3\/analysis\/1489424899\/\" target=\"_blank\">988e9fa903cc2fbb80e7221072fb2221<\/a> \u2013 Diamond Fox Crystal (final VB payload)<\/p>\n<p><a href=\"https:\/\/virustotal.com\/en\/file\/8e27def9169a918c279ed328b9d93b76d43295023dff9798c1cbb64fd8957b56\/analysis\/1491043692\/\" target=\"_blank\">3ef960da3e4bc4bc7c05d02fbf121d4e<\/a> &#8211; old Diamond Fox (final VB payload)<\/p>\n<h3>Changelog<\/h3>\n<p>In the release that is sold on the black market, the authors included a changelog describing all versions up to the current one (codenamed Crystal). Below, you can see the related fragment:<\/p>\n<pre><strong>Crystal Version<\/strong>  [+] Loader core recoded  [+] Improved Size: 17.5 kb  [+] Added unlimited panel list  [+] Added domain generation algorithm  [+] Added RunOne startup  [+] Added Polices startup  [+] Added auto-screenshots  [+] added Install redirects  [+] Added Anti-WinPcap  [+] Added Anti-Virustotal VM  [+] Added Anti-Emulation  [-] Removed Anti-Wine  [-] Moved Startup Persistance to Persistance  [+] Added Botkiller  [+] Added Anti-Avast Sandbox  [+] Added PE configuration storage  [+] Improved Configuration preview  [+] Added optional usb spread on lite bot  [+] Added RDP plugin  [+] Added VNC Grabber  [+] Added remote shell  [+] Added Close bot command  [+] Added Shutdown PC command  [+] Improved web panel installer  [+] Added Restart PC command  [+] Added more bot selection options on tasks  [+] Improved task manager  [+] Added search on reports  [+] Improved panel settings  [+] Added Layer7 DDoS  [+] Added reports bars statistics  [+] Added New\/dead bots per week statistics  [+] Updated Geodata  [+] Added Bot remover tool  [+] Added DGA tool  [+] Improved real-time notifications on panel  [+] Added Desktop\/Laptop Detection  [+] Added administrator detection  [+] Improved bot full information  [+] Added mark as favorite  [-] removed %PROGRAMFILES% installation path  [+] added %USERPROFILE% installation path  [-] removed %WINDIR% installation path  [+] added %LOCALAPPDATA% installation path  [-] Removed winlogon startup  [+] Added schtaks startup  [-] Removed Anti-apateDNS  [-] Removed Anti-Norman  [-] Removed Anti-wiresshark  [-] Removed Xor Encryption  [+] Added captcha on web panel login  [+] Added antibruter forcer on web panel login  [+] Added new panel logo  [+] Improved Crypto wallet stealer (+24)  [+] Improved Homepage changer (added internet explorer)  [+] Improved Keylogger(added clipboard detector and window title trigger)  [+] Improved bot speed  [+] Improved bot compatibility  [+] Improved bot stability  [-] Removed Services tab on web panel  [+] Added protected folder on installation  [+] Now the webpanel can be installed on windows without errors  <\/pre>\n<h3>Decompiling<\/h3>\n<p>As we mentioned in the previous post, Diamond Fox is written in Visual Basic and after unpacking it can be decompiled by VB Decompiler. Unfortunately, the results of the decompilation are not fully accurate and some parts of the code are difficult to analyze. However, we can still figure out the most important actions performed by the malware.<\/p>\n<p>We provided a partially cleaned version of the decompiled code: <a href=\"https:\/\/gist.github.com\/hasherezade\/79de1509c8565ec7496cd554092df6f8#file-module1-vb\" target=\"_blank\">https:\/\/gist.github.com\/hasherezade\/79de1509c8565ec7496cd554092df6f8#file-module1-vb<\/a>.<\/p>\n<h3>Execution flow<\/h3>\n<p>Diamond Fox starts its execution from decrypting and parsing the configuration &#8211; in this edition, it is stored in the section &#8220;<em>L!NK<\/em>&#8220;. Then, depending on the configuration, some further features are enabled or disabled. For example, it may deploy defensive checks &#8211; against sandboxes and Virtual Machines.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16963\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/config_read.png\" alt=\"\" width=\"795\" height=\"272\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/config_read.png 795w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/config_read-300x103.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/config_read-600x205.png 600w\" sizes=\"auto, (max-width: 795px) 100vw, 795px\" \/><\/p>\n<p>The stored parameters are encrypted and they are decrypted at runtime &#8211; however, the decryption function is no longer a simple XOR known from the previous versions:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16965\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/decrypt.png\" alt=\"\" width=\"952\" height=\"700\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/decrypt.png 952w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/decrypt-300x221.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/decrypt-600x441.png 600w\" sizes=\"auto, (max-width: 952px) 100vw, 952px\" \/><\/p>\n<p><em>(see a partially cleaned version of this function: <a href=\"https:\/\/gist.github.com\/hasherezade\/79de1509c8565ec7496cd554092df6f8#file-decrypt-vb\" target=\"_blank\">https:\/\/gist.github.com\/hasherezade\/79de1509c8565ec7496cd554092df6f8#file-decrypt-vb<\/a><strong> )<\/strong><\/em><\/p>\n<p>Along with the features that can be enabled or disabled depending on the configuration, Diamond Fox offers features that are controlled from the CnC.<\/p>\n<p>Reading response from the CnC:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16970\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/reading_response.png\" alt=\"\" width=\"1174\" height=\"432\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/reading_response.png 1174w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/reading_response-300x110.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/reading_response-600x221.png 600w\" sizes=\"auto, (max-width: 1174px) 100vw, 1174px\" \/><\/p>\n<p>Parsing commands and executing appropriate actions (commands are identified by numbers &#8211; from 0 to 25):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16969\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/commands.png\" alt=\"\" width=\"957\" height=\"893\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/commands.png 957w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/commands-300x280.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/commands-600x560.png 600w\" sizes=\"auto, (max-width: 957px) 100vw, 957px\" \/><\/p>\n<h3>Features<\/h3>\n<p>Let&#8217;s have a look inside the code and follow the features mentioned by the authors.<\/p>\n<pre>[+] Loader core recoded<\/pre>\n<p>The code of the malware has been reorganized and its big portions have been rewritten. It can be noticed at first sight\u00a0if we decompile the new version and compare it versus the old one. In the current version everything is in one module, while in the previous cases the code was subdivided into various modules.<\/p>\n<p>Old Diamond Fox decompiled (fragment):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16944\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/old_df.png\" alt=\"\" width=\"221\" height=\"314\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/old_df.png 221w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/old_df-211x300.png 211w\" sizes=\"auto, (max-width: 221px) 100vw, 221px\" \/><\/p>\n<p>We can see the code subdivided on modules with descriptive names, making analysis easier. In the new version, we will not find this familiar layout.<\/p>\n<p>Decompiled code of Diamond Fox Crystal (the new one):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16946\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/df_new.png\" alt=\"\" width=\"234\" height=\"238\" \/><\/p>\n<p>The new version introduced a different way of storing the configuration. Now, the encrypted configuration is in the dedicated section named &#8220;<em>L!NK<\/em>&#8220;.<\/p>\n<pre>[+] Added domain generation algorithm<\/pre>\n<p>In the analyzed sample this feature was not enabled and the CnC address was static. However, looking at\u00a0the code we can find a domain generation algorithm (DGA) is based on the current date:<br \/> <a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/dga.png\" target=\"_blank\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16894\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/dga.png\" alt=\"\" width=\"1000\" height=\"494\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/dga.png 1000w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/dga-300x148.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/dga-600x296.png 600w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p>\n<p><em>(see a partially cleaned version of this function: <a href=\"https:\/\/gist.github.com\/hasherezade\/79de1509c8565ec7496cd554092df6f8#file-domain_generate-vb\" target=\"_blank\">https:\/\/gist.github.com\/hasherezade\/79de1509c8565ec7496cd554092df6f8#file-domain_generate-vb<\/a>)<\/em><\/p>\n<pre>[+] Added Anti-Emulation<\/pre>\n<p>Checking if the sample is not running in a\u00a0VM or sandbox by attempting to load DLLs associated with the virtual environment:<\/p>\n<ul>\n<li>vboxmrxnp<\/li>\n<li>SbieDll<\/li>\n<li>snxhk<\/li>\n<li>pthreadVC<\/li>\n<\/ul>\n<p>It comes also with a set of blacklisted volume serial numbers, identifying popular sandboxes:<\/p>\n<ul>\n<li>AC79B241<\/li>\n<li>70144646<\/li>\n<li>6C78A9C3<\/li>\n<\/ul>\n<pre>[+] Added Desktop\/Laptop Detection<\/pre>\n<p>Checking if it is running on the laptop by testing battery presence:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16907\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/is_laptop.png\" alt=\"\" width=\"641\" height=\"243\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/is_laptop.png 641w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/is_laptop-300x114.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/is_laptop-600x227.png 600w\" sizes=\"auto, (max-width: 641px) 100vw, 641px\" \/><\/p>\n<pre>[+] Added PE configuration storage<\/pre>\n<p>The section L!NK is used not only to store initial configuration, but also some fetched data.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16908\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/store_config1.png\" alt=\"\" width=\"663\" height=\"414\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/store_config1.png 663w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/store_config1-300x187.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/store_config1-600x375.png 600w\" sizes=\"auto, (max-width: 663px) 100vw, 663px\" \/><\/p>\n<p>The random ID of the bot is generated and stored:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16909\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/get_random_str.png\" alt=\"\" width=\"947\" height=\"152\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/get_random_str.png 947w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/get_random_str-300x48.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/get_random_str-600x96.png 600w\" sizes=\"auto, (max-width: 947px) 100vw, 947px\" \/><\/p>\n<pre>[+] Improved Crypto wallet stealer (+24)<\/pre>\n<p>We can find in the code strings used to search several crypto wallets:<\/p>\n<pre>MultiBit, Armory, Electrum, digital, -LTC, MultiDoge, BitcoinDark,   Unobtanium, Dash, Bit, Lite, Name, PP, Feather, Nova, Prime, Terra,   Dev, Anon, Pay, World, Quark, Infinite, Doge, Asic, Lotto, Dark, Mona  <\/pre>\n<p>Analyzing the code deeper, we find that first the .wallet files are searched:<br \/> <img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16888\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/wallets.png\" alt=\"\" width=\"654\" height=\"783\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/wallets.png 654w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/wallets-251x300.png 251w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/wallets-501x600.png 501w\" sizes=\"auto, (max-width: 654px) 100vw, 654px\" \/><br \/> The found data is grabbed and passed into another function:<br \/> <img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16889\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/grab_data.png\" alt=\"\" width=\"938\" height=\"244\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/grab_data.png 938w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/grab_data-300x78.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/grab_data-600x156.png 600w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/p>\n<p>That function is responsible for posting the grabbed content to the CnC server:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16891\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/post_data.png\" alt=\"\" width=\"1000\" height=\"337\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/post_data.png 1000w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/post_data-300x101.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/post_data-600x202.png 600w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<pre>[+] Added captcha on web panel login<\/pre>\n<p>We can observe it if we try to follow the address of the CnC captured during the behavioral analysis. Indeed, near to the credential fields we can see a very simple captcha:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16893\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/basic_panel.png\" alt=\"\" width=\"962\" height=\"553\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/basic_panel.png 962w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/basic_panel-300x172.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/basic_panel-600x345.png 600w\" sizes=\"auto, (max-width: 962px) 100vw, 962px\" \/><\/p>\n<pre>[+] Added new panel logo<\/pre>\n<p>The authors of Diamond Fox put a lot of effort to make a graphic design attractive for the user. This time, the panel comes with a set of logos that are randomly changing on page refresh. This feature may seem fancy and redundant in a malware;\u00a0however, it shows the effort put on the user experience.<\/p>\n<pre>[+] Improved Keylogger(added clipboard detector and window title trigger)<\/pre>\n<p>As we saw during behavioral analysis, Diamond Fox generates neatly formatted reports about captured users&#8217; activities. They include Clipboard content and the title of the main window, where the particular text was typed:<br \/> <img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16843\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/report.png\" alt=\"\" width=\"726\" height=\"544\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/report.png 726w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/report-300x225.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/03\/report-600x450.png 600w\" sizes=\"auto, (max-width: 726px) 100vw, 726px\" \/><\/p>\n<h3>Conclusion<\/h3>\n<p>Diamond Fox Crystal has been solidly refactored in comparison to the older versions. Removing descriptive modules&#8217; names made analysis more difficult. Due to the change in the method of encrypting configuration, now retrieving its content is not as trivial.<\/p>\n<p>Overall, Diamond Fox comes with typical features that we can expect from the stealer. In spite of some improvements, the code quality is still nothing impressive.<\/p>\n<h3>Appendix<\/h3>\n<p><a href=\"https:\/\/www.cylance.com\/a-study-in-bots-diamondfox\" target=\"_blank\">https:\/\/www.cylance.com\/a-study-in-bots-diamondfox<\/a> &#8211; about an elder version of Diamond Fox<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/diamond-fox-p2\/\">Diamond Fox &#8211; part 2: let&#8217;s dive in the code<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/diamond-fox-p2\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Thu, 06 Apr 2017 15:00:30 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/diamond-fox-p2\/' title='Diamond Fox - part 2: let's dive in the code'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/04\/photodune-8741303-diamond-xxl.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>In a\u00a0previous post we made an initial analysis of a Diamond Fox bot delivered by the Nebula Exploit Kit (more about the campaign can be found here). We described the way to unpack the protection layer in order to get the core, written in Visual Basic, that can be decompiled. In this second part of&#8230;<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/malware-threat-analysis\/\" rel=\"category tag\">Malware<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/diamond-fox\/\" rel=\"tag\">Diamond Fox<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ek\/\" rel=\"tag\">EK<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit-kit\/\" rel=\"tag\">exploit kit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nebula\/\" rel=\"tag\">Nebula<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/nebula-exploit-kit\/\" rel=\"tag\">Nebula Exploit Kit<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/diamond-fox-p2\/' title='Diamond Fox - part 2: let's dive in the code'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/04\/diamond-fox-p2\/\">Diamond Fox &#8211; part 2: let&#8217;s dive in the code<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11664,10527,10534,3764,11898,11899,10494],"class_list":["post-7255","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-diamond-fox","tag-ek","tag-exploit-kit","tag-malware","tag-nebula","tag-nebula-exploit-kit","tag-threat-analysis"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7255","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7255"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7255\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7255"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}