General
-
Target
f2a70cd70e1b15cf34903bcef46e2202
-
Size
1.0MB
-
Sample
210719-kw4v5gvwhj
-
MD5
f2a70cd70e1b15cf34903bcef46e2202
-
SHA1
a3136e4e4270d788e500ae984d3d8993e6cf6c91
-
SHA256
3c62996e0dc98bf3e9ebbdcf8c89f47429fa7a0285ddcd665923b70b06d4586a
-
SHA512
caf9b6d95dc11858b2de6a819b84fd12cd695ec5878486d34142595794a5a8dd4c3cebce3a16e6bc9e8deab08f8b492413e2b0b61683696392502e9485b98bd5
Static task
static1
Behavioral task
behavioral1
Sample
f2a70cd70e1b15cf34903bcef46e2202.exe
Resource
win7v20210410
Malware Config
Extracted
danabot
1987
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
Targets
-
-
Target
f2a70cd70e1b15cf34903bcef46e2202
-
Size
1.0MB
-
MD5
f2a70cd70e1b15cf34903bcef46e2202
-
SHA1
a3136e4e4270d788e500ae984d3d8993e6cf6c91
-
SHA256
3c62996e0dc98bf3e9ebbdcf8c89f47429fa7a0285ddcd665923b70b06d4586a
-
SHA512
caf9b6d95dc11858b2de6a819b84fd12cd695ec5878486d34142595794a5a8dd4c3cebce3a16e6bc9e8deab08f8b492413e2b0b61683696392502e9485b98bd5
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-