General
-
Target
79178a255065fa70bae805de9df75657b182b54650e81fffe9b36e6c803195a5
-
Size
1.9MB
-
Sample
220916-fezcvsefg6
-
MD5
f42ae357fb68f2b9d5611747b95e2330
-
SHA1
2378b5297f6aeadd76829279e1f0c7254781c6b8
-
SHA256
79178a255065fa70bae805de9df75657b182b54650e81fffe9b36e6c803195a5
-
SHA512
ebaaabacdf3d2cf488f77372ba7c5eea0e6f56ba49bef2e61cdc1884e5d14018c8cb6cab18412077cc87aa54f0aa7788d0ae16645abbf8def267a4b2d7622481
-
SSDEEP
24576:8n7EK6OHwYgKrpeMIj+haxZu7rhiHv6VMdlT42kx+AU3yoqsr2thynjIk+Wb+Dji:XK4ZK97wHvH/42kanyIVYEX3bt
Static task
static1
Malware Config
Extracted
danabot
103.144.139.228:443
213.227.154.98:443
66.85.147.23:443
153.92.223.225:443
-
embedded_hash
A64A3A6ED13022027B84C77D31BE0C74
-
type
loader
Targets
-
-
Target
79178a255065fa70bae805de9df75657b182b54650e81fffe9b36e6c803195a5
-
Size
1.9MB
-
MD5
f42ae357fb68f2b9d5611747b95e2330
-
SHA1
2378b5297f6aeadd76829279e1f0c7254781c6b8
-
SHA256
79178a255065fa70bae805de9df75657b182b54650e81fffe9b36e6c803195a5
-
SHA512
ebaaabacdf3d2cf488f77372ba7c5eea0e6f56ba49bef2e61cdc1884e5d14018c8cb6cab18412077cc87aa54f0aa7788d0ae16645abbf8def267a4b2d7622481
-
SSDEEP
24576:8n7EK6OHwYgKrpeMIj+haxZu7rhiHv6VMdlT42kx+AU3yoqsr2thynjIk+Wb+Dji:XK4ZK97wHvH/42kanyIVYEX3bt
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-