General
-
Target
bbcc5e3ca7e87e9050071b250a55d59b
-
Size
1MB
-
Sample
210725-c3nc6qktx6
-
MD5
bbcc5e3ca7e87e9050071b250a55d59b
-
SHA1
899efad6150077f3d3a80d82ed567799467bacce
-
SHA256
9610051a347d56ae5d91e3a3c471a2d90b5a4e02b2aa714f931d4cbe164eb42c
-
SHA512
ab676ee81674ac67ad9694c8d29ed59bfac79c0802b671ad87d19bc47532a37e2e1c2c7dfe1a70873107999a75de64d24ba8678194bcf1e6032c1e214d0b99db
Static task
static1
Behavioral task
behavioral1
Sample
bbcc5e3ca7e87e9050071b250a55d59b.exe
Resource
win7v20210408
Malware Config
Extracted
danabot
1987
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
Targets
-
-
Target
bbcc5e3ca7e87e9050071b250a55d59b
-
Size
1MB
-
MD5
bbcc5e3ca7e87e9050071b250a55d59b
-
SHA1
899efad6150077f3d3a80d82ed567799467bacce
-
SHA256
9610051a347d56ae5d91e3a3c471a2d90b5a4e02b2aa714f931d4cbe164eb42c
-
SHA512
ab676ee81674ac67ad9694c8d29ed59bfac79c0802b671ad87d19bc47532a37e2e1c2c7dfe1a70873107999a75de64d24ba8678194bcf1e6032c1e214d0b99db
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-