General
-
Target
63d270bc6d03003f7937214b37bd5e8e.exe
-
Size
6.0MB
-
Sample
210523-hmqz7tkx6x
-
MD5
63d270bc6d03003f7937214b37bd5e8e
-
SHA1
29e465bb174aefb2abce9399470193efb3574607
-
SHA256
054d00eb13d64e28f77951a8b55ea3882acf5d585fbf322b868c0d585f35a12a
-
SHA512
3368741dc72d8c34aff4c3941896985cace70ee1cece2ec846f7d1e17275756fb26953463e38f5501d2b7fd789fb91e43ac62c6e7e1752f5d21f0c84e2a8460e
Static task
static1
Behavioral task
behavioral1
Sample
63d270bc6d03003f7937214b37bd5e8e.exe
Resource
win7v20210410
Malware Config
Extracted
danabot
1827
3
184.95.51.183:443
184.95.51.175:443
192.210.198.12:443
184.95.51.180:443
-
embedded_hash
AEF96B4D339B580ABB737F203C2D0F52
Targets
-
-
Target
63d270bc6d03003f7937214b37bd5e8e.exe
-
Size
6.0MB
-
MD5
63d270bc6d03003f7937214b37bd5e8e
-
SHA1
29e465bb174aefb2abce9399470193efb3574607
-
SHA256
054d00eb13d64e28f77951a8b55ea3882acf5d585fbf322b868c0d585f35a12a
-
SHA512
3368741dc72d8c34aff4c3941896985cace70ee1cece2ec846f7d1e17275756fb26953463e38f5501d2b7fd789fb91e43ac62c6e7e1752f5d21f0c84e2a8460e
-
Blocklisted process makes network request
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-