General
-
Target
422d86725c78c459b4858787ec6816cc.exe
-
Size
6.1MB
-
Sample
210611-35thwsbh4j
-
MD5
422d86725c78c459b4858787ec6816cc
-
SHA1
f6cd2041d6f446916580bfa11da9c87ed5bdac94
-
SHA256
fa02e3ce72acc362ffe44170bfc8f7dcf95057870310e37d15959999b8e9abf6
-
SHA512
6d97d77c132db7535bd4ad92acae388e1447e8b6f46e3fdf93b7fc4367ba2c6c84799514706f0da863c09492c58d1c8778243afdff650e89ecd50b7027865863
Static task
static1
Behavioral task
behavioral1
Sample
422d86725c78c459b4858787ec6816cc.exe
Resource
win7v20210410
Malware Config
Extracted
danabot
1827
3
192.210.198.12:443
37.220.31.50:443
184.95.51.183:443
184.95.51.175:443
-
embedded_hash
410EB249B3A3D8613B29638D583F7193
Targets
-
-
Target
422d86725c78c459b4858787ec6816cc.exe
-
Size
6.1MB
-
MD5
422d86725c78c459b4858787ec6816cc
-
SHA1
f6cd2041d6f446916580bfa11da9c87ed5bdac94
-
SHA256
fa02e3ce72acc362ffe44170bfc8f7dcf95057870310e37d15959999b8e9abf6
-
SHA512
6d97d77c132db7535bd4ad92acae388e1447e8b6f46e3fdf93b7fc4367ba2c6c84799514706f0da863c09492c58d1c8778243afdff650e89ecd50b7027865863
-
Blocklisted process makes network request
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-