General
-
Target
57ff8b095742c37f4e1308be1544a7b92e065bbfd63055b2f43764629e4af47a
-
Size
2.4MB
-
Sample
220909-lqeqgsghd3
-
MD5
f229b94308e9900d6834de7db885651d
-
SHA1
024f195118bf5452c5e3da5a6915768295ae20cf
-
SHA256
57ff8b095742c37f4e1308be1544a7b92e065bbfd63055b2f43764629e4af47a
-
SHA512
f8465ce188a2f9130fd4660f37e1f1125a4745c95f4452be2cbee2555c7b56b9ac8825e22ec63eef2bcc746a81378391ce2230b22ada984dfd65f2cbd0145b3b
-
SSDEEP
49152:MzCGyhEJd+kX7KWTq27R66+DTItNSlzlygePIq50rJm+lX3:MWGyinrKUvt6pDTVlRyPlkdX3
Static task
static1
Malware Config
Extracted
danabot
153.92.223.225:443
198.15.112.179:443
185.62.56.245:443
66.85.147.23:443
-
embedded_hash
61A1CB063216C13FFD2E15D7F3F515E2
-
type
loader
Targets
-
-
Target
57ff8b095742c37f4e1308be1544a7b92e065bbfd63055b2f43764629e4af47a
-
Size
2.4MB
-
MD5
f229b94308e9900d6834de7db885651d
-
SHA1
024f195118bf5452c5e3da5a6915768295ae20cf
-
SHA256
57ff8b095742c37f4e1308be1544a7b92e065bbfd63055b2f43764629e4af47a
-
SHA512
f8465ce188a2f9130fd4660f37e1f1125a4745c95f4452be2cbee2555c7b56b9ac8825e22ec63eef2bcc746a81378391ce2230b22ada984dfd65f2cbd0145b3b
-
SSDEEP
49152:MzCGyhEJd+kX7KWTq27R66+DTItNSlzlygePIq50rJm+lX3:MWGyinrKUvt6pDTVlRyPlkdX3
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-