General
-
Target
vps43.exe
-
Size
654KB
-
Sample
200307-n9z51lnn7x
-
MD5
c176c662c99aa9e1d36f4717ca27f078
-
SHA1
338655f5b87439da2546a35f11ce761b84821fec
-
SHA256
bdfa4ada92b902def37a7ea83f6c4be174a9e63ebc5701f8ec4e01b126556b44
-
SHA512
049627032aa01d9f150f849eb496f6d832a9a64dc0debc57345bff1fc21d74ccb0584c7d758334f0c445717864c40a2b192d363ef7ce6d201a598e8663e461ff
Static task
static1
Behavioral task
behavioral1
Sample
vps43.exe
Resource
win7v200217
Behavioral task
behavioral2
Sample
vps43.exe
Resource
win10v200217
Malware Config
Extracted
danabot
5.61.56.192
5.61.58.130
2.56.212.4
58.188.144.17
123.112.255.121
73.95.154.165
18.179.60.205
47.1.50.27
109.115.156.127
2.56.213.39
226.24.58.229
214.251.0.68
118.124.17.69
32.5.51.86
207.17.93.111
109.80.105.108
Targets
-
-
Target
vps43.exe
-
Size
654KB
-
MD5
c176c662c99aa9e1d36f4717ca27f078
-
SHA1
338655f5b87439da2546a35f11ce761b84821fec
-
SHA256
bdfa4ada92b902def37a7ea83f6c4be174a9e63ebc5701f8ec4e01b126556b44
-
SHA512
049627032aa01d9f150f849eb496f6d832a9a64dc0debc57345bff1fc21d74ccb0584c7d758334f0c445717864c40a2b192d363ef7ce6d201a598e8663e461ff
-
Danabot x86 payload
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-