General
-
Target
e496a2012a67bead17a4b47cae40729a.exe
-
Size
6.0MB
-
Sample
210603-qcztdxn6w2
-
MD5
e496a2012a67bead17a4b47cae40729a
-
SHA1
45e5362e9e0b00ed469259c633b0505d4486c587
-
SHA256
db8220cbd62d1046db60abc9af4d4218c1a5b4193e970f19fcec7e67d58a1292
-
SHA512
b4c51aada78c8c9c689101a6212b1c55211b7ec9bf555f390963f75b0e4369db475d4c1ce992b63cae177d38c8c7e3cac34db30af9eacd83be2d60c31b16fbd8
Static task
static1
Behavioral task
behavioral1
Sample
e496a2012a67bead17a4b47cae40729a.exe
Resource
win7v20210408
Malware Config
Extracted
danabot
1827
3
184.95.51.183:443
184.95.51.175:443
192.210.198.12:443
184.95.51.180:443
-
embedded_hash
AEF96B4D339B580ABB737F203C2D0F52
Targets
-
-
Target
e496a2012a67bead17a4b47cae40729a.exe
-
Size
6.0MB
-
MD5
e496a2012a67bead17a4b47cae40729a
-
SHA1
45e5362e9e0b00ed469259c633b0505d4486c587
-
SHA256
db8220cbd62d1046db60abc9af4d4218c1a5b4193e970f19fcec7e67d58a1292
-
SHA512
b4c51aada78c8c9c689101a6212b1c55211b7ec9bf555f390963f75b0e4369db475d4c1ce992b63cae177d38c8c7e3cac34db30af9eacd83be2d60c31b16fbd8
-
Blocklisted process makes network request
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-