General
-
Target
c979fcf6650ed3746eb926bc6cffc277.exe
-
Size
6.0MB
-
Sample
210503-p3sfqhxlk2
-
MD5
c979fcf6650ed3746eb926bc6cffc277
-
SHA1
e39266cc398530a908907262f117e7ab35690a07
-
SHA256
2ea63a323c4a133149548d3c9b1a690a7e759cbc28df9c171b126ad90b22b061
-
SHA512
446a2b17b2a9d32d4ff0e9a07705e54bbf0dac74791507fcafd78322389c33689bda1177f17501503da592256420dba47b13428c5b3b69bc06d028f9ea31fe97
Static task
static1
Behavioral task
behavioral1
Sample
c979fcf6650ed3746eb926bc6cffc277.exe
Resource
win7v20210410
Malware Config
Extracted
danabot
1827
3
23.106.123.185:443
192.210.198.12:443
192.236.147.83:443
37.220.31.94:443
-
embedded_hash
AEF96B4D339B580ABB737F203C2D0F52
Targets
-
-
Target
c979fcf6650ed3746eb926bc6cffc277.exe
-
Size
6.0MB
-
MD5
c979fcf6650ed3746eb926bc6cffc277
-
SHA1
e39266cc398530a908907262f117e7ab35690a07
-
SHA256
2ea63a323c4a133149548d3c9b1a690a7e759cbc28df9c171b126ad90b22b061
-
SHA512
446a2b17b2a9d32d4ff0e9a07705e54bbf0dac74791507fcafd78322389c33689bda1177f17501503da592256420dba47b13428c5b3b69bc06d028f9ea31fe97
-
Blocklisted process makes network request
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-