Resubmissions
29-09-2021 10:05
210929-l4j75aefbp 10General
-
Target
baabe38154bc2271d603513346457154.exe
-
Size
1.1MB
-
Sample
210929-l4j75aefbp
-
MD5
baabe38154bc2271d603513346457154
-
SHA1
86ebdcd4ba7e7985c80f3897d5adba2d2c923d52
-
SHA256
0c1978c1bc51c425f13e670074ddfd36d3e6e458dab5bcb1527c2b37953e13d6
-
SHA512
149c353564df264c5d7f32f072fdcdc91e0c0ee12fe0508968003a887412fa9d47204abadc9d8c61cb955bdc1e3335db8f6f334a7838f62f95d3f28d8d576502
Static task
static1
Behavioral task
behavioral1
Sample
baabe38154bc2271d603513346457154.exe
Resource
win7-en-20210920
Malware Config
Extracted
danabot
2052
4
142.11.192.232:443
192.119.110.73:443
142.11.242.31:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
Targets
-
-
Target
baabe38154bc2271d603513346457154.exe
-
Size
1.1MB
-
MD5
baabe38154bc2271d603513346457154
-
SHA1
86ebdcd4ba7e7985c80f3897d5adba2d2c923d52
-
SHA256
0c1978c1bc51c425f13e670074ddfd36d3e6e458dab5bcb1527c2b37953e13d6
-
SHA512
149c353564df264c5d7f32f072fdcdc91e0c0ee12fe0508968003a887412fa9d47204abadc9d8c61cb955bdc1e3335db8f6f334a7838f62f95d3f28d8d576502
-
Danabot Loader Component
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-