General
-
Target
5ad49d198a05d8f867d7a65fb74aa6e50ea1954c25282a4ba419b18bd57883a8
-
Size
586KB
-
Sample
200316-9wen9he6qx
-
MD5
84199f05e4ed67e1e80b1249aff5dbd8
-
SHA1
0958acfba862f8c7e9a7057d9bd098ffca49b1c1
-
SHA256
5ad49d198a05d8f867d7a65fb74aa6e50ea1954c25282a4ba419b18bd57883a8
-
SHA512
9bf5d946a7a6b91c8aafe85054a0f304fcd09e84bbe75408575f0cdebcb64c080765aeb98a3a165087dda1b594b6d0aa6828697cf6db23490156f57a6444a917
Static task
static1
Behavioral task
behavioral1
Sample
5ad49d198a05d8f867d7a65fb74aa6e50ea1954c25282a4ba419b18bd57883a8.exe
Resource
win7v200217
Malware Config
Extracted
danabot
5.61.56.192
5.61.58.130
2.56.212.4
37.149.137.207
160.201.198.109
61.8.211.106
12.37.246.239
93.24.204.214
194.27.196.221
2.56.213.39
Targets
-
-
Target
5ad49d198a05d8f867d7a65fb74aa6e50ea1954c25282a4ba419b18bd57883a8
-
Size
586KB
-
MD5
84199f05e4ed67e1e80b1249aff5dbd8
-
SHA1
0958acfba862f8c7e9a7057d9bd098ffca49b1c1
-
SHA256
5ad49d198a05d8f867d7a65fb74aa6e50ea1954c25282a4ba419b18bd57883a8
-
SHA512
9bf5d946a7a6b91c8aafe85054a0f304fcd09e84bbe75408575f0cdebcb64c080765aeb98a3a165087dda1b594b6d0aa6828697cf6db23490156f57a6444a917
-
Danabot x86 payload
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-