General
-
Target
d1cfa8ad99dcaf9a91d0af1b29310675.exe
-
Size
6.0MB
-
Sample
210607-jewgqntjfe
-
MD5
d1cfa8ad99dcaf9a91d0af1b29310675
-
SHA1
9eba3cc72636e3e7bcb93581951f85152351ea49
-
SHA256
fa65b830c25bb9059023842ab5f4c93d55f2c2bbc9bf51179022813c956b05cb
-
SHA512
163b4079ebf843ffddf4aa08472cea6fad8ea25cfe4c1f1f9dd7df896d09505c2c0d3aaaa78e8b15df2ad42f022424bfeb0f11d9f1b999644d201cf2792af739
Static task
static1
Behavioral task
behavioral1
Sample
d1cfa8ad99dcaf9a91d0af1b29310675.exe
Resource
win7v20210410
Malware Config
Extracted
danabot
1827
3
184.95.51.183:443
184.95.51.175:443
192.210.198.12:443
184.95.51.180:443
-
embedded_hash
AEF96B4D339B580ABB737F203C2D0F52
Targets
-
-
Target
d1cfa8ad99dcaf9a91d0af1b29310675.exe
-
Size
6.0MB
-
MD5
d1cfa8ad99dcaf9a91d0af1b29310675
-
SHA1
9eba3cc72636e3e7bcb93581951f85152351ea49
-
SHA256
fa65b830c25bb9059023842ab5f4c93d55f2c2bbc9bf51179022813c956b05cb
-
SHA512
163b4079ebf843ffddf4aa08472cea6fad8ea25cfe4c1f1f9dd7df896d09505c2c0d3aaaa78e8b15df2ad42f022424bfeb0f11d9f1b999644d201cf2792af739
-
Blocklisted process makes network request
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-