General
-
Target
2b524898db45a552df6f133a75176ae35b3037515a807d99bbc8debf174f3aa0
-
Size
2.5MB
-
Sample
220910-y666wsecfl
-
MD5
4a1fa9f2b66e78715e321c7082f04114
-
SHA1
ba409290c92ccc69842e22f8b4848510b24c2a19
-
SHA256
2b524898db45a552df6f133a75176ae35b3037515a807d99bbc8debf174f3aa0
-
SHA512
093c28badea2c189106faba7bd9b7a28c657405820bd74c7db1464353e29639deff6a3b11271bd4e59bbb12d0fa5eb21a2e3ef4a735a88428d53c2f69f6bcc6e
-
SSDEEP
49152:KEVq87OqihTIn+0ZsfY0FwYJ49x+sp+wkuRJDu/Q34Sc:hVjOgp0X49NUCJDEQ
Static task
static1
Malware Config
Extracted
danabot
153.92.223.225:443
198.15.112.179:443
185.62.56.245:443
66.85.147.23:443
-
embedded_hash
61A1CB063216C13FFD2E15D7F3F515E2
-
type
loader
Targets
-
-
Target
2b524898db45a552df6f133a75176ae35b3037515a807d99bbc8debf174f3aa0
-
Size
2.5MB
-
MD5
4a1fa9f2b66e78715e321c7082f04114
-
SHA1
ba409290c92ccc69842e22f8b4848510b24c2a19
-
SHA256
2b524898db45a552df6f133a75176ae35b3037515a807d99bbc8debf174f3aa0
-
SHA512
093c28badea2c189106faba7bd9b7a28c657405820bd74c7db1464353e29639deff6a3b11271bd4e59bbb12d0fa5eb21a2e3ef4a735a88428d53c2f69f6bcc6e
-
SSDEEP
49152:KEVq87OqihTIn+0ZsfY0FwYJ49x+sp+wkuRJDu/Q34Sc:hVjOgp0X49NUCJDEQ
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-