General
-
Target
f4fb49bf0ddac9147012e47b1cdcaa67.exe
-
Size
6.1MB
-
Sample
210610-qh1t6bblpe
-
MD5
f4fb49bf0ddac9147012e47b1cdcaa67
-
SHA1
bab5a2e12c744a6819629da140b12c8c8fe67c32
-
SHA256
eb2f15018cb74ad0c97044c7687df83445d45d6752104b0cbc9fad9ed22813be
-
SHA512
0b3bbc1ae1c68384c3f54420aaa9a5cbcf9e6a969c000d1721d2de7d2eac367af22f9d77c105ae5237da41548ff6d8643a2d250839509d4137d5602d8bb23b8d
Static task
static1
Behavioral task
behavioral1
Sample
f4fb49bf0ddac9147012e47b1cdcaa67.exe
Resource
win7v20210410
Malware Config
Extracted
danabot
1827
3
192.210.198.12:443
37.220.31.50:443
184.95.51.183:443
184.95.51.175:443
-
embedded_hash
410EB249B3A3D8613B29638D583F7193
Targets
-
-
Target
f4fb49bf0ddac9147012e47b1cdcaa67.exe
-
Size
6.1MB
-
MD5
f4fb49bf0ddac9147012e47b1cdcaa67
-
SHA1
bab5a2e12c744a6819629da140b12c8c8fe67c32
-
SHA256
eb2f15018cb74ad0c97044c7687df83445d45d6752104b0cbc9fad9ed22813be
-
SHA512
0b3bbc1ae1c68384c3f54420aaa9a5cbcf9e6a969c000d1721d2de7d2eac367af22f9d77c105ae5237da41548ff6d8643a2d250839509d4137d5602d8bb23b8d
-
Blocklisted process makes network request
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-