General
-
Target
35c44dc33a6fb38cf9a8577dbf8a7414.exe
-
Size
6.1MB
-
Sample
210610-dsxfq8bpba
-
MD5
35c44dc33a6fb38cf9a8577dbf8a7414
-
SHA1
6ad619af46b262219a520b32bc8af26904082f17
-
SHA256
f279bd873b230e7a9743fd03d89b9dcee87d8f29152e234c8478bd578807ec74
-
SHA512
84272eccb292510c2bdb104b27e3ea6be1f291fce30faf28f80d434edda0211b364d0749effb78bc4eebdef115e037c9dd58f224785cd8ceb521038e571a8170
Static task
static1
Behavioral task
behavioral1
Sample
35c44dc33a6fb38cf9a8577dbf8a7414.exe
Resource
win7v20210410
Malware Config
Extracted
danabot
1827
3
192.210.198.12:443
37.220.31.50:443
184.95.51.183:443
184.95.51.175:443
-
embedded_hash
410EB249B3A3D8613B29638D583F7193
Targets
-
-
Target
35c44dc33a6fb38cf9a8577dbf8a7414.exe
-
Size
6.1MB
-
MD5
35c44dc33a6fb38cf9a8577dbf8a7414
-
SHA1
6ad619af46b262219a520b32bc8af26904082f17
-
SHA256
f279bd873b230e7a9743fd03d89b9dcee87d8f29152e234c8478bd578807ec74
-
SHA512
84272eccb292510c2bdb104b27e3ea6be1f291fce30faf28f80d434edda0211b364d0749effb78bc4eebdef115e037c9dd58f224785cd8ceb521038e571a8170
-
Blocklisted process makes network request
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-