General
-
Target
9D68E9449BCF593ABFD4562466A7CC2D35B1C33868E3B.exe
-
Size
6.0MB
-
Sample
220716-zxqyzsfahn
-
MD5
5c0be4a5273dec6b3ebb180a90f337f2
-
SHA1
3a82216a89310aa7b4cee1e58a3af7e16c0cce19
-
SHA256
9d68e9449bcf593abfd4562466a7cc2d35b1c33868e3bcf0e47bda4d9fc78403
-
SHA512
4e922ede66f69d3eb3f6baac3db20b0675df36ec60fd1d940c80e772b5fa28f8d85c68f9e1aa4d89a552d802ade54f762004f0e0eb2ed4b4f8dee8b6cbd0becc
Static task
static1
Behavioral task
behavioral1
Sample
9D68E9449BCF593ABFD4562466A7CC2D35B1C33868E3B.exe
Resource
win7-20220715-en
Malware Config
Extracted
danabot
1765
3
192.3.26.98:443
192.3.26.107:443
192.161.48.5:443
192.236.146.203:443
-
embedded_hash
B2585F6479280F48B64C99F950BBF36D
-
type
main
Targets
-
-
Target
9D68E9449BCF593ABFD4562466A7CC2D35B1C33868E3B.exe
-
Size
6.0MB
-
MD5
5c0be4a5273dec6b3ebb180a90f337f2
-
SHA1
3a82216a89310aa7b4cee1e58a3af7e16c0cce19
-
SHA256
9d68e9449bcf593abfd4562466a7cc2d35b1c33868e3bcf0e47bda4d9fc78403
-
SHA512
4e922ede66f69d3eb3f6baac3db20b0675df36ec60fd1d940c80e772b5fa28f8d85c68f9e1aa4d89a552d802ade54f762004f0e0eb2ed4b4f8dee8b6cbd0becc
-
suricata: ET MALWARE Danabot Key Exchange Request
suricata: ET MALWARE Danabot Key Exchange Request
-
Blocklisted process makes network request
-
Deletes itself
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-