General
-
Target
00d6af109ea4cb29969480e0802cedcc.exe
-
Size
6.1MB
-
Sample
210603-dm1sckk7ne
-
MD5
00d6af109ea4cb29969480e0802cedcc
-
SHA1
2da16a8f7c1d3f4f15d16aa2a5f0caf28b69cdc7
-
SHA256
70ab50a285413501e885a1335a980316dc09f6f00b4adeeee31da8c1369f4c66
-
SHA512
3c09891819ac2feaf54d9060b15d91860b8b670a7792ba2f2c49dbe71fd9bcece067191ede55f92129a22b43a1e7c3a4731cceea3481f29ed3b1fae8fb939353
Static task
static1
Behavioral task
behavioral1
Sample
00d6af109ea4cb29969480e0802cedcc.exe
Resource
win7v20210410
Malware Config
Extracted
danabot
1827
3
184.95.51.183:443
184.95.51.175:443
192.210.198.12:443
184.95.51.180:443
-
embedded_hash
AEF96B4D339B580ABB737F203C2D0F52
Targets
-
-
Target
00d6af109ea4cb29969480e0802cedcc.exe
-
Size
6.1MB
-
MD5
00d6af109ea4cb29969480e0802cedcc
-
SHA1
2da16a8f7c1d3f4f15d16aa2a5f0caf28b69cdc7
-
SHA256
70ab50a285413501e885a1335a980316dc09f6f00b4adeeee31da8c1369f4c66
-
SHA512
3c09891819ac2feaf54d9060b15d91860b8b670a7792ba2f2c49dbe71fd9bcece067191ede55f92129a22b43a1e7c3a4731cceea3481f29ed3b1fae8fb939353
-
Blocklisted process makes network request
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-