General
-
Target
c044ffcbac6f16c4322deb7957cc901c.exe
-
Size
1.3MB
-
Sample
221010-h7tdesbab5
-
MD5
c044ffcbac6f16c4322deb7957cc901c
-
SHA1
36234162600dcf2730ba01e07125dc497bac74b7
-
SHA256
93582891bce408609f20af2a38f181e77b8134cc3a87e0fd887edadf29be6373
-
SHA512
d48ca582f20bca1e668c06d5a5616933c5bc38287bbc64715d506cd10d387eeec106f2a0669e74371351b95f324dd5cafc5c90d4aa5dea35a41a2ce9d143db0b
-
SSDEEP
24576:Q4wlY+1ZBpNIuDdhcOvNtnsQVB4Ak7uMdsLd1XBktTV7yUX9rl:QRlYcZBDvXsmk7l3WUx
Static task
static1
Behavioral task
behavioral1
Sample
c044ffcbac6f16c4322deb7957cc901c.exe
Resource
win7-20220812-en
Malware Config
Extracted
danabot
192.236.233.188:443
192.119.70.159:443
23.106.124.171:443
213.227.155.103:443
49.0.50.0:57
51.0.52.0:0
53.0.54.0:1200
55.0.56.0:65535
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Targets
-
-
Target
c044ffcbac6f16c4322deb7957cc901c.exe
-
Size
1.3MB
-
MD5
c044ffcbac6f16c4322deb7957cc901c
-
SHA1
36234162600dcf2730ba01e07125dc497bac74b7
-
SHA256
93582891bce408609f20af2a38f181e77b8134cc3a87e0fd887edadf29be6373
-
SHA512
d48ca582f20bca1e668c06d5a5616933c5bc38287bbc64715d506cd10d387eeec106f2a0669e74371351b95f324dd5cafc5c90d4aa5dea35a41a2ce9d143db0b
-
SSDEEP
24576:Q4wlY+1ZBpNIuDdhcOvNtnsQVB4Ak7uMdsLd1XBktTV7yUX9rl:QRlYcZBDvXsmk7l3WUx
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-