General
-
Target
2a3acdcd76575762b18c18c644a745125f55ce121f742d2aad962521bc7f25fd
-
Size
2.5MB
-
Sample
211022-rgvm8sbga3
-
MD5
de8b54a938ac18f15cad804d79a0e19d
-
SHA1
b6004c62e2d9dbad9cfd5f7e18647ac983788766
-
SHA256
2a3acdcd76575762b18c18c644a745125f55ce121f742d2aad962521bc7f25fd
-
SHA512
7b64a99baafc8e692a47b9856f96b6bafa3cae22bd293c0e8faf148bdfe3f1401d5c316017b5c2f778d02ebc87edd2474e525b225ddc00685bb14da4c484e776
Static task
static1
Behavioral task
behavioral1
Sample
2a3acdcd76575762b18c18c644a745125f55ce121f742d2aad962521bc7f25fd.dll
Resource
win7-en-20211014
Malware Config
Extracted
danabot
185.158.250.216:443
194.76.225.46:443
45.11.180.153:443
194.76.225.61:443
-
embedded_hash
AD14EA44261341E3690FA8CC1E236523
-
type
loader
Extracted
danabot
2052
40
185.158.250.216:443
194.76.225.46:443
45.11.180.153:443
194.76.225.61:443
-
embedded_hash
AD14EA44261341E3690FA8CC1E236523
-
type
main
Targets
-
-
Target
2a3acdcd76575762b18c18c644a745125f55ce121f742d2aad962521bc7f25fd
-
Size
2.5MB
-
MD5
de8b54a938ac18f15cad804d79a0e19d
-
SHA1
b6004c62e2d9dbad9cfd5f7e18647ac983788766
-
SHA256
2a3acdcd76575762b18c18c644a745125f55ce121f742d2aad962521bc7f25fd
-
SHA512
7b64a99baafc8e692a47b9856f96b6bafa3cae22bd293c0e8faf148bdfe3f1401d5c316017b5c2f778d02ebc87edd2474e525b225ddc00685bb14da4c484e776
-
Danabot Loader Component
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Blocklisted process makes network request
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-