General
-
Target
61113d3e16d65cc74d36073b51da8c3c9f9aac38a8c1b5f52cf37d0ab80087b1
-
Size
258KB
-
Sample
220730-18va8abefn
-
MD5
b2b19eac9ccbdac8d795fca6ef418ee3
-
SHA1
fd1b11fef8fd453893a0c495ab9857252087da92
-
SHA256
61113d3e16d65cc74d36073b51da8c3c9f9aac38a8c1b5f52cf37d0ab80087b1
-
SHA512
a239312c5d4276e6ef446f29300ef20c2aff1d780128c2dfcb299ac1d33113b2440af8bb8f3991134e82948690bea3d6ca020c493100bb201b3f5e65c14318bb
Static task
static1
Behavioral task
behavioral1
Sample
Rechnung_DHL_00069290444019.vbs
Resource
win7-20220715-en
Malware Config
Extracted
danabot
185.43.196.194
170.36.230.93
25.125.161.14
152.163.122.91
252.243.36.124
94.2.203.24
95.179.186.57
58.41.130.190
89.144.25.104
182.54.114.216
Targets
-
-
Target
Rechnung_DHL_00069290444019.vbs
-
Size
1.4MB
-
MD5
1ef8b148b1b51343c3150d5dad342d3e
-
SHA1
3d554440983f890cda93149bc4cbfdfad9ac6f3e
-
SHA256
7b50c5555749ee419657fb8d40a9a1c6e2f103df413ddd53eadd22917ca15ad2
-
SHA512
bedcea3dd21f8772932ac96c26297e7b4823492679af39b0d9d640592d0648f192c7fe78aedf816e5c2acc75c71989a7605d9daf0193a9d2cd099dcc71e3d692
-
Danabot x86 payload
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-