General
-
Target
0b727a2f45073dfbed3c2096aed86c3631372ad56f763dedc6b7f59152d1e094
-
Size
2.4MB
-
Sample
220907-hfaf8sgdgr
-
MD5
8bcaa79c45d51a44dc6a05c4b8cf4114
-
SHA1
ccd28984173d63dc50db0a4a1c8ffee96dbf30a4
-
SHA256
0b727a2f45073dfbed3c2096aed86c3631372ad56f763dedc6b7f59152d1e094
-
SHA512
bdf68c5feadb5e31f3bd34e0e93cb93631fcee9ef9a2181d4cddabf2732dbc922a31a5a889ba209f91d826143d992e38f02e45c115c168b7f6fd884ef576bba3
-
SSDEEP
49152:pB7gGuhQPiM5QuHHzMr0R682FRZy6Eao2LXMeEiBRgy3xrDkvYB0IqSy:pB8KPZJzMrMW06g2DMLiR3x0YB0vS
Static task
static1
Malware Config
Extracted
danabot
153.92.223.225:443
198.15.112.179:443
185.62.56.245:443
66.85.147.23:443
-
embedded_hash
61A1CB063216C13FFD2E15D7F3F515E2
-
type
loader
Targets
-
-
Target
0b727a2f45073dfbed3c2096aed86c3631372ad56f763dedc6b7f59152d1e094
-
Size
2.4MB
-
MD5
8bcaa79c45d51a44dc6a05c4b8cf4114
-
SHA1
ccd28984173d63dc50db0a4a1c8ffee96dbf30a4
-
SHA256
0b727a2f45073dfbed3c2096aed86c3631372ad56f763dedc6b7f59152d1e094
-
SHA512
bdf68c5feadb5e31f3bd34e0e93cb93631fcee9ef9a2181d4cddabf2732dbc922a31a5a889ba209f91d826143d992e38f02e45c115c168b7f6fd884ef576bba3
-
SSDEEP
49152:pB7gGuhQPiM5QuHHzMr0R682FRZy6Eao2LXMeEiBRgy3xrDkvYB0IqSy:pB8KPZJzMrMW06g2DMLiR3x0YB0vS
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-