General
-
Target
vpn.exe
-
Size
1.0MB
-
Sample
210503-ysebcm538a
-
MD5
ae672455612bde0a10259c441ffc97b3
-
SHA1
378527fc598c402982fc0816282fef5e97318a76
-
SHA256
83c713b4f6938fb03c8ddbbfd0830b90aa9dc33cc8309f8866396860e4b59243
-
SHA512
f366df4117ff648b3d205dd0c5713054a6733bc86e70018065514d0075c87c50b188a95a159dd6ccda72bce22f3baf5797e3cfc470ac150bf47e6c74851fbe81
Static task
static1
Behavioral task
behavioral1
Sample
vpn.exe
Resource
win7v20210408
Malware Config
Extracted
danabot
1827
3
23.106.123.185:443
192.210.198.12:443
192.236.147.83:443
37.220.31.94:443
-
embedded_hash
AEF96B4D339B580ABB737F203C2D0F52
Targets
-
-
Target
vpn.exe
-
Size
1.0MB
-
MD5
ae672455612bde0a10259c441ffc97b3
-
SHA1
378527fc598c402982fc0816282fef5e97318a76
-
SHA256
83c713b4f6938fb03c8ddbbfd0830b90aa9dc33cc8309f8866396860e4b59243
-
SHA512
f366df4117ff648b3d205dd0c5713054a6733bc86e70018065514d0075c87c50b188a95a159dd6ccda72bce22f3baf5797e3cfc470ac150bf47e6c74851fbe81
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-