General
-
Target
83a67ecd166b919255b264718993c284a3238971a24c939c45e0c525f3361a43.bin
-
Size
5.2MB
-
Sample
210125-ltafad7e5a
-
MD5
3a4299537272d8671d85c99c17918e99
-
SHA1
93ff8577a13146091e40349fa523a6f54bd5fa2a
-
SHA256
83a67ecd166b919255b264718993c284a3238971a24c939c45e0c525f3361a43
-
SHA512
29011d41fdfc35cf3a4fe84fc08536bf1aa2afae2954227c58c53bbd922dcbfe256c43844e4153b56888f0e648dc57ad25d9bf15abe0dfb5796c2276b2ff1d28
Behavioral task
behavioral1
Sample
83a67ecd166b919255b264718993c284a3238971a24c939c45e0c525f3361a43.bin.dll
Resource
win7v20201028
Malware Config
Extracted
danabot
1732
21
149.129.212.179:443
47.254.247.133:443
159.89.114.62:443
138.197.139.56:443
-
embedded_hash
DE6DF8FA2198DD77CFD93D89D8ECC62D
Targets
-
-
Target
83a67ecd166b919255b264718993c284a3238971a24c939c45e0c525f3361a43.bin
-
Size
5.2MB
-
MD5
3a4299537272d8671d85c99c17918e99
-
SHA1
93ff8577a13146091e40349fa523a6f54bd5fa2a
-
SHA256
83a67ecd166b919255b264718993c284a3238971a24c939c45e0c525f3361a43
-
SHA512
29011d41fdfc35cf3a4fe84fc08536bf1aa2afae2954227c58c53bbd922dcbfe256c43844e4153b56888f0e648dc57ad25d9bf15abe0dfb5796c2276b2ff1d28
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-