General
-
Target
vps.exe
-
Size
617KB
-
Sample
200308-wr9j1bk3ra
-
MD5
163b2c613da6d50487576ea4e155c9ff
-
SHA1
107c19028feb65133f9c2a83ba26c989cf9ca638
-
SHA256
5d6b33acd126dae1d806ca4b3a3a85ef55abc3f38c31eef95f295ce81ba901d2
-
SHA512
cdc718948858762f270b7556d4a8e42193d3aa5db5cd036f2291fa3525bd7eee658414b6fa91c15d66f1e6cba368453b78f50462decb7c26850d19ce655fac0a
Static task
static1
Behavioral task
behavioral1
Sample
vps.exe
Resource
win7v200217
Behavioral task
behavioral2
Sample
vps.exe
Resource
win10v200217
Malware Config
Extracted
danabot
5.61.56.192
5.61.58.130
2.56.212.4
58.188.144.17
123.112.255.121
73.95.154.165
18.179.60.205
47.1.50.27
109.115.156.127
2.56.213.39
226.24.58.229
214.251.0.68
118.124.17.69
32.5.51.86
207.17.93.111
109.80.105.108
Targets
-
-
Target
vps.exe
-
Size
617KB
-
MD5
163b2c613da6d50487576ea4e155c9ff
-
SHA1
107c19028feb65133f9c2a83ba26c989cf9ca638
-
SHA256
5d6b33acd126dae1d806ca4b3a3a85ef55abc3f38c31eef95f295ce81ba901d2
-
SHA512
cdc718948858762f270b7556d4a8e42193d3aa5db5cd036f2291fa3525bd7eee658414b6fa91c15d66f1e6cba368453b78f50462decb7c26850d19ce655fac0a
-
Danabot x86 payload
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-