General
-
Target
d18dc9cf860133016c0c244b9ad579bd.exe
-
Size
1.7MB
-
Sample
210613-hv82tssrte
-
MD5
d18dc9cf860133016c0c244b9ad579bd
-
SHA1
1fc0e27cdab3f5ff40cac4448f4023c0693ec071
-
SHA256
0329f707c1e908925f23bc015b422526620f308142a2e75df56257ac3aec4c3a
-
SHA512
77d9135160dc9e35c3112e8036e0f39778235c3630805001b1230090fba47104ed306e30b4633dcfcd4f0440d731ba5c4a61906ec1140f78bd0b2e3241e91f1f
Static task
static1
Behavioral task
behavioral1
Sample
d18dc9cf860133016c0c244b9ad579bd.exe
Resource
win7v20210410
Malware Config
Extracted
danabot
1827
3
192.210.198.12:443
37.220.31.50:443
184.95.51.183:443
184.95.51.175:443
-
embedded_hash
410EB249B3A3D8613B29638D583F7193
Targets
-
-
Target
d18dc9cf860133016c0c244b9ad579bd.exe
-
Size
1.7MB
-
MD5
d18dc9cf860133016c0c244b9ad579bd
-
SHA1
1fc0e27cdab3f5ff40cac4448f4023c0693ec071
-
SHA256
0329f707c1e908925f23bc015b422526620f308142a2e75df56257ac3aec4c3a
-
SHA512
77d9135160dc9e35c3112e8036e0f39778235c3630805001b1230090fba47104ed306e30b4633dcfcd4f0440d731ba5c4a61906ec1140f78bd0b2e3241e91f1f
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-