General
-
Target
AXO23516563548321.vbs
-
Size
4.6MB
-
Sample
200203-dsclmgmn4x
-
MD5
9c2592eb51ea3339ee113d151b623d55
-
SHA1
da4af1db47dfe8b257ac53f754975598bc8b1a1c
-
SHA256
eb7289b966dadc5ea1f99ca35cde7fc4f2380426f632a2bedb98e26fea9d44f4
-
SHA512
b5d3367429f1cd538b59dbeb75ed3b49f43f8a4419d6ffcd34ffb6541e2163e6470bba084e0ba8ed8c07df52a717a28125e29603c9ad168b7d91bca9fd0aca57
Task
task1
Sample
AXO23516563548321.vbs
Resource
win7v191014
Task
task2
Sample
AXO23516563548321.vbs
Resource
win10v191014
Static task
static1
Malware Config
Extracted
danabot
199.247.16.30
64.188.22.153
64.188.23.155
64.188.22.33
64.188.22.154
64.188.22.122
64.188.22.155
64.188.22.156
64.188.23.31
209.250.243.55
Targets
-
-
Target
AXO23516563548321.vbs
-
Size
4.6MB
-
MD5
9c2592eb51ea3339ee113d151b623d55
-
SHA1
da4af1db47dfe8b257ac53f754975598bc8b1a1c
-
SHA256
eb7289b966dadc5ea1f99ca35cde7fc4f2380426f632a2bedb98e26fea9d44f4
-
SHA512
b5d3367429f1cd538b59dbeb75ed3b49f43f8a4419d6ffcd34ffb6541e2163e6470bba084e0ba8ed8c07df52a717a28125e29603c9ad168b7d91bca9fd0aca57
-
Danabot x86 payload
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-