General
-
Target
02a87432aa8362fae07a1f6f53e01635c45dce79453e057a899bcf1588b40763.zip
-
Size
1.6MB
-
Sample
210524-5c8tdzagg6
-
MD5
8faed9affb3e83e8e73d7e3a09e5f41c
-
SHA1
d2be977b56cec34ab283dab806f68dc709d1031a
-
SHA256
f3a5b0f539135e55de5cbfe1f710b00c5e6823aa826732b96612dcd1f2373611
-
SHA512
a5f0f1e732170030834cb1c83275ce813758e7ebb9ef835d817624893a1571275dc2343a3b859d74b84e1532e32980f415cc055a3f6b05b9cc306800a048f09d
Static task
static1
Behavioral task
behavioral1
Sample
02a87432aa8362fae07a1f6f53e01635c45dce79453e057a899bcf1588b40763.exe
Resource
win7v20210408
Malware Config
Extracted
danabot
1827
3
184.95.51.183:443
184.95.51.175:443
192.210.198.12:443
184.95.51.180:443
-
embedded_hash
AEF96B4D339B580ABB737F203C2D0F52
Targets
-
-
Target
02a87432aa8362fae07a1f6f53e01635c45dce79453e057a899bcf1588b40763
-
Size
1.7MB
-
MD5
ccc92a7d91a981fd54101e0e69b6bb64
-
SHA1
767a3f8bf4e5808f1130175d4e117d261ec094f5
-
SHA256
02a87432aa8362fae07a1f6f53e01635c45dce79453e057a899bcf1588b40763
-
SHA512
809d6a5e1349aaf53fd1914e0ddc5a14cd94c432907a3c47f46e419991ca06af36a7105f2ddb8f3eca4442bf37371ed03eab1152b9828ea6be8fa6b900c3f27a
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-