General
-
Target
file.exe
-
Size
145KB
-
Sample
221006-w66t1sabe7
-
MD5
327fbadbc8a3c28527e0418d4c62479b
-
SHA1
ba1ca69c594d712097e83e80c7ec4ede8a9fe4cc
-
SHA256
a3348bb15dcb57d79dbad2165ba4ee441732af3e653e1a4390ad2023d398036b
-
SHA512
e4eb29157ce0d15c68e8e9ef3aefa5b646913e4b499ca908caf9bc96bf09517609f951bc9f65db118e19187190fdcb76103824acbbbbe32b23c31f7c0a16ff5f
-
SSDEEP
3072:5r2xmTL4yEElFiJeiqMfzBE5rTcnf4lmzooAdASO:5rMeL4yzi8JO1E5/cnAEohAS
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220901-en
Malware Config
Extracted
danabot
192.236.233.188:443
192.119.70.159:443
23.106.124.171:443
213.227.155.103:443
49.0.50.0:57
51.0.52.0:0
53.0.54.0:1200
55.0.56.0:65535
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Targets
-
-
Target
file.exe
-
Size
145KB
-
MD5
327fbadbc8a3c28527e0418d4c62479b
-
SHA1
ba1ca69c594d712097e83e80c7ec4ede8a9fe4cc
-
SHA256
a3348bb15dcb57d79dbad2165ba4ee441732af3e653e1a4390ad2023d398036b
-
SHA512
e4eb29157ce0d15c68e8e9ef3aefa5b646913e4b499ca908caf9bc96bf09517609f951bc9f65db118e19187190fdcb76103824acbbbbe32b23c31f7c0a16ff5f
-
SSDEEP
3072:5r2xmTL4yEElFiJeiqMfzBE5rTcnf4lmzooAdASO:5rMeL4yzi8JO1E5/cnAEohAS
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-