General
-
Target
file.exe
-
Size
302KB
-
Sample
220916-sjfsjagae2
-
MD5
8e0161260d7ed54102d6bd68e757deda
-
SHA1
af479240e0160d6d4652750e33d2bb7efd440c36
-
SHA256
05ad5d389e9131aae7bc392e66e4fb3e7ead3dde6158f28d3e8c0e27c2d73546
-
SHA512
be0c060d35bf1674d3bbc1b150d9b8074eb9590a5bfe6d57188f4e853eca23c57819582a533aec23492d986d6b78512549ca0848bd2d6de7feb3b12e1a3de671
-
SSDEEP
3072:HVXWkUEP2gysUDW1kCzR2iUyW4ygN5re4cW+jCZ4w0KARX5T2HmTM/h3BsxkgaBO:xWpENUry/K4dRmw0bHnigabwVf
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
danabot
103.144.139.228:443
213.227.154.98:443
66.85.147.23:443
153.92.223.225:443
-
embedded_hash
A64A3A6ED13022027B84C77D31BE0C74
-
type
loader
Targets
-
-
Target
file.exe
-
Size
302KB
-
MD5
8e0161260d7ed54102d6bd68e757deda
-
SHA1
af479240e0160d6d4652750e33d2bb7efd440c36
-
SHA256
05ad5d389e9131aae7bc392e66e4fb3e7ead3dde6158f28d3e8c0e27c2d73546
-
SHA512
be0c060d35bf1674d3bbc1b150d9b8074eb9590a5bfe6d57188f4e853eca23c57819582a533aec23492d986d6b78512549ca0848bd2d6de7feb3b12e1a3de671
-
SSDEEP
3072:HVXWkUEP2gysUDW1kCzR2iUyW4ygN5re4cW+jCZ4w0KARX5T2HmTM/h3BsxkgaBO:xWpENUry/K4dRmw0bHnigabwVf
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-