General
-
Target
SecuriteInfo.com.Win32.Packed.Enigma.EY.4634
-
Size
7.9MB
-
Sample
200625-n58nwalyvx
-
MD5
78632f99e8fd64fca5e8cf7ae613c674
-
SHA1
91ec27976c60b44a9807bf713ef97ad3ad92dd1b
-
SHA256
aeb1bfcef382789091e72e2d6cae6e471123d0e8e7a5f39c64abf5a3d9a4eaa8
-
SHA512
921b58d21fbef6484cb79d3b8cc5cdefd88f53317f9a1f9b667512b8ae09d7cea69bed20440b0887e38f1228b06f174b5cc5be927db99f51bf9f13daa45a3b64
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.Packed.Enigma.EY.4634.exe
Resource
win7
Malware Config
Extracted
danabot
92.204.160.126
37.120.145.243
195.133.147.230
185.227.138.52
Targets
-
-
Target
SecuriteInfo.com.Win32.Packed.Enigma.EY.4634
-
Size
7.9MB
-
MD5
78632f99e8fd64fca5e8cf7ae613c674
-
SHA1
91ec27976c60b44a9807bf713ef97ad3ad92dd1b
-
SHA256
aeb1bfcef382789091e72e2d6cae6e471123d0e8e7a5f39c64abf5a3d9a4eaa8
-
SHA512
921b58d21fbef6484cb79d3b8cc5cdefd88f53317f9a1f9b667512b8ae09d7cea69bed20440b0887e38f1228b06f174b5cc5be927db99f51bf9f13daa45a3b64
-
Danabot x86 payload
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-