General
-
Target
3350aae4c4ebb8a9d200f05d1fd7950b.exe
-
Size
4.4MB
-
Sample
210102-crxjkqvydj
-
MD5
3350aae4c4ebb8a9d200f05d1fd7950b
-
SHA1
19468c85dd6772e7d5566bd9f3c216c4e8bfcfae
-
SHA256
e3433215e57803029ce2a3e019d844b377aeb77ea11e0154289fbd4c24838d51
-
SHA512
0646016c83f4da20138a4a9c710b368de53152000e8bce6cebfedea787bb9a1c94068078b88ba557976c12fa009c6cb72305dcafacdb85a6d59587cac2aeef86
Static task
static1
Behavioral task
behavioral1
Sample
3350aae4c4ebb8a9d200f05d1fd7950b.exe
Resource
win7v20201028
Malware Config
Extracted
danabot
1732
3
108.62.118.103:443
23.226.132.92:443
23.106.123.249:443
108.62.141.152:443
-
embedded_hash
49574F66CD0103BBD725C08A9805C2BE
Targets
-
-
Target
3350aae4c4ebb8a9d200f05d1fd7950b.exe
-
Size
4.4MB
-
MD5
3350aae4c4ebb8a9d200f05d1fd7950b
-
SHA1
19468c85dd6772e7d5566bd9f3c216c4e8bfcfae
-
SHA256
e3433215e57803029ce2a3e019d844b377aeb77ea11e0154289fbd4c24838d51
-
SHA512
0646016c83f4da20138a4a9c710b368de53152000e8bce6cebfedea787bb9a1c94068078b88ba557976c12fa009c6cb72305dcafacdb85a6d59587cac2aeef86
-
Blocklisted process makes network request
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-