General
-
Target
tepserv.exe
-
Size
1.1MB
-
Sample
210826-ae6ksmbjc2
-
MD5
0884288b2df269ff9b34fddff3eb3208
-
SHA1
1480a8543b3c1fd4d26dc30fb60b8f9e1306aa0b
-
SHA256
1ebddf22053d7670fc06fae9e4e2ff41cd48054f563ccab3c7561c6d1f989e91
-
SHA512
f5ab8884eac60f2a4026b512491bde6cd8cd7df79f7d00c7f9dd8cbd1871ed5d981f7785481fa12446c217e4bed1ea7cc931a9d47dad5bd3ffa9c54db9c1320e
Static task
static1
Behavioral task
behavioral1
Sample
tepserv.exe
Resource
win7v20210408
Malware Config
Extracted
danabot
2029
4
23.229.29.48:443
5.9.224.204:443
192.210.222.81:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
Targets
-
-
Target
tepserv.exe
-
Size
1.1MB
-
MD5
0884288b2df269ff9b34fddff3eb3208
-
SHA1
1480a8543b3c1fd4d26dc30fb60b8f9e1306aa0b
-
SHA256
1ebddf22053d7670fc06fae9e4e2ff41cd48054f563ccab3c7561c6d1f989e91
-
SHA512
f5ab8884eac60f2a4026b512491bde6cd8cd7df79f7d00c7f9dd8cbd1871ed5d981f7785481fa12446c217e4bed1ea7cc931a9d47dad5bd3ffa9c54db9c1320e
-
Danabot Loader Component
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-