General
-
Target
84113794321f0537639784792578a1e9efa5ce046ee5823fbb4248e78b2ce99e
-
Size
1.1MB
-
Sample
211021-ek1mfahgg3
-
MD5
9ac7471c31fffb3c1ccb96a12f472903
-
SHA1
26f2779bcc4b1a18e9b4fff68aac9d5fcdad7ce7
-
SHA256
84113794321f0537639784792578a1e9efa5ce046ee5823fbb4248e78b2ce99e
-
SHA512
b6ac956dc7c72bf0a8a822aa99945d7d218e2cba896edc944ceb674e4aa343d6bebeb536f24184110942e2035b9f5787e38069afdcbe6ec1ac4f87b20471a47f
Static task
static1
Malware Config
Extracted
danabot
192.119.110.73:443
192.236.147.159:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Extracted
danabot
2052
4
192.119.110.73:443
192.236.147.159:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
main
Targets
-
-
Target
84113794321f0537639784792578a1e9efa5ce046ee5823fbb4248e78b2ce99e
-
Size
1.1MB
-
MD5
9ac7471c31fffb3c1ccb96a12f472903
-
SHA1
26f2779bcc4b1a18e9b4fff68aac9d5fcdad7ce7
-
SHA256
84113794321f0537639784792578a1e9efa5ce046ee5823fbb4248e78b2ce99e
-
SHA512
b6ac956dc7c72bf0a8a822aa99945d7d218e2cba896edc944ceb674e4aa343d6bebeb536f24184110942e2035b9f5787e38069afdcbe6ec1ac4f87b20471a47f
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-