General
-
Target
file.exe
-
Size
270KB
-
Sample
221010-k3armabcf8
-
MD5
7a9c98d7a95f26b155b1f134b40215ec
-
SHA1
2509f76fee5d5a11acdfb6e63f86b6364ca01a72
-
SHA256
c70fbaa04edd53c4e28b84e416e9bc3f42a736dff08a47face9f023f46d93384
-
SHA512
f0e4a7ee48440024d2013ed76bb963a8e44b6ca62c4f9d14925d1e2dae3008c52ad2ae2b79c4fed2afa409dd7bc0bdc0b68e149892860de6eeb0ba296a0d5daa
-
SSDEEP
3072:OXhodXu6tKUWlYfhO50XuNghWu3jgM84aycoSNsj4Qnhqn/M/h3qpZa9uD6Vdyhh:Wi+cfh5XuNgh/8MNSObnhq/rwVfquS
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
danabot
192.236.233.188:443
192.119.70.159:443
23.106.124.171:443
213.227.155.103:443
49.0.50.0:57
51.0.52.0:0
53.0.54.0:1200
55.0.56.0:65535
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Targets
-
-
Target
file.exe
-
Size
270KB
-
MD5
7a9c98d7a95f26b155b1f134b40215ec
-
SHA1
2509f76fee5d5a11acdfb6e63f86b6364ca01a72
-
SHA256
c70fbaa04edd53c4e28b84e416e9bc3f42a736dff08a47face9f023f46d93384
-
SHA512
f0e4a7ee48440024d2013ed76bb963a8e44b6ca62c4f9d14925d1e2dae3008c52ad2ae2b79c4fed2afa409dd7bc0bdc0b68e149892860de6eeb0ba296a0d5daa
-
SSDEEP
3072:OXhodXu6tKUWlYfhO50XuNghWu3jgM84aycoSNsj4Qnhqn/M/h3qpZa9uD6Vdyhh:Wi+cfh5XuNgh/8MNSObnhq/rwVfquS
Score10/10-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-