General
-
Target
loaded.bin
-
Size
4.0MB
-
Sample
210601-gewhjclscx
-
MD5
d685f70e0e276d44503a7a4db3f2b81e
-
SHA1
1d276eeb5d4e3a3cd8f5291927e98cd1e3fb7392
-
SHA256
74b8b2e3d124aefc4463a3eef842502ea387de3d680c8ea3b4ea02f29fa34092
-
SHA512
f4372a002cf8916d54f235e684dad637107e66d26849515fcfdabeb6cf526a562646298d67ae04264c42f7656c0a0be73253ee95eb9537ae8078c396b14266bd
Static task
static1
Behavioral task
behavioral1
Sample
loaded.bin.exe
Resource
win7v20210408
Malware Config
Extracted
danabot
1765
3
192.236.192.241:443
134.119.186.199:443
172.93.201.39:443
104.168.156.222:443
-
embedded_hash
82C66843DE542BC5CB88F713DE39B52B
Targets
-
-
Target
loaded.bin
-
Size
4.0MB
-
MD5
d685f70e0e276d44503a7a4db3f2b81e
-
SHA1
1d276eeb5d4e3a3cd8f5291927e98cd1e3fb7392
-
SHA256
74b8b2e3d124aefc4463a3eef842502ea387de3d680c8ea3b4ea02f29fa34092
-
SHA512
f4372a002cf8916d54f235e684dad637107e66d26849515fcfdabeb6cf526a562646298d67ae04264c42f7656c0a0be73253ee95eb9537ae8078c396b14266bd
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Blocklisted process makes network request
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-