General
-
Target
be5050ecd867ea931bcecaafa8d10d6f8c83ab677be207a4a1332f063b3d8624
-
Size
4.4MB
-
Sample
220708-rw458agah5
-
MD5
a10d4f80ed910baeb4fd603e7b121643
-
SHA1
3716da6b25cc95a7a17c4fc2a412db52043cc4b0
-
SHA256
be5050ecd867ea931bcecaafa8d10d6f8c83ab677be207a4a1332f063b3d8624
-
SHA512
fa6d059476a193e9b85516df678d99139d0c73f00f38217ceef4f49d290b498385c735e0d8dbc49c618e4b62fa7dbf39a85a614505b7a8fca4136e16e0ac7b31
Static task
static1
Behavioral task
behavioral1
Sample
be5050ecd867ea931bcecaafa8d10d6f8c83ab677be207a4a1332f063b3d8624.exe
Resource
win7-20220414-en
Malware Config
Extracted
danabot
1732
3
108.62.118.103:443
23.226.132.92:443
104.144.64.163:443
108.62.141.152:443
-
embedded_hash
49574F66CD0103BBD725C08A9805C2BE
-
type
main
Targets
-
-
Target
be5050ecd867ea931bcecaafa8d10d6f8c83ab677be207a4a1332f063b3d8624
-
Size
4.4MB
-
MD5
a10d4f80ed910baeb4fd603e7b121643
-
SHA1
3716da6b25cc95a7a17c4fc2a412db52043cc4b0
-
SHA256
be5050ecd867ea931bcecaafa8d10d6f8c83ab677be207a4a1332f063b3d8624
-
SHA512
fa6d059476a193e9b85516df678d99139d0c73f00f38217ceef4f49d290b498385c735e0d8dbc49c618e4b62fa7dbf39a85a614505b7a8fca4136e16e0ac7b31
-
Blocklisted process makes network request
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-