General
-
Target
10b43e3a0ea62d2da4c09a1377ca8eba.exe
-
Size
6.1MB
-
Sample
210614-47byl5yhbx
-
MD5
10b43e3a0ea62d2da4c09a1377ca8eba
-
SHA1
7d03bb47e0284f6a139849c2190c16a0c0b68379
-
SHA256
b76c0b97e9a444717580fdb3e3c26cd38ae42366761eda3b2a10868614eee0fe
-
SHA512
f08937fe06930cf3dad6100f6bd6da5745fbe15968b0df4f6a351e384cc28387613ec45378ea1ef9d9e2bebedac3d40fa5a853ba85815c4c041113918fcd06a9
Static task
static1
Behavioral task
behavioral1
Sample
10b43e3a0ea62d2da4c09a1377ca8eba.exe
Resource
win7v20210410
Malware Config
Extracted
danabot
1827
3
192.210.198.12:443
37.220.31.50:443
184.95.51.183:443
184.95.51.175:443
-
embedded_hash
410EB249B3A3D8613B29638D583F7193
Targets
-
-
Target
10b43e3a0ea62d2da4c09a1377ca8eba.exe
-
Size
6.1MB
-
MD5
10b43e3a0ea62d2da4c09a1377ca8eba
-
SHA1
7d03bb47e0284f6a139849c2190c16a0c0b68379
-
SHA256
b76c0b97e9a444717580fdb3e3c26cd38ae42366761eda3b2a10868614eee0fe
-
SHA512
f08937fe06930cf3dad6100f6bd6da5745fbe15968b0df4f6a351e384cc28387613ec45378ea1ef9d9e2bebedac3d40fa5a853ba85815c4c041113918fcd06a9
-
Blocklisted process makes network request
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-