General
-
Target
file.exe
-
Size
211KB
-
Sample
221011-psb9xsedcr
-
MD5
dccb3894da2926eef9ec0b6310967c3a
-
SHA1
26146d192e9bc185df670b8bafa7520ea6edc93d
-
SHA256
cba1e1b3ae358d0462d8d060079791887499c6fa9ca558582af96fa61cf5d0ff
-
SHA512
da39ed75d881ebfc468820a59c23b914302b34991cb96f852c8b3206d9a7ee0a7743704653dda13d97ffa3b092faf9b1979bbc17fd7006d18811a36733ef72fd
-
SSDEEP
3072:3/jg8f8QV27rLq9I2/t84VwXMUbCHAIh2Ht1CrR5dO:3cZtPLq9I2lw8UbTIh2Nsrt
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Malware Config
Extracted
danabot
192.236.233.188:443
192.119.70.159:443
23.106.124.171:443
213.227.155.103:443
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Targets
-
-
Target
file.exe
-
Size
211KB
-
MD5
dccb3894da2926eef9ec0b6310967c3a
-
SHA1
26146d192e9bc185df670b8bafa7520ea6edc93d
-
SHA256
cba1e1b3ae358d0462d8d060079791887499c6fa9ca558582af96fa61cf5d0ff
-
SHA512
da39ed75d881ebfc468820a59c23b914302b34991cb96f852c8b3206d9a7ee0a7743704653dda13d97ffa3b092faf9b1979bbc17fd7006d18811a36733ef72fd
-
SSDEEP
3072:3/jg8f8QV27rLq9I2/t84VwXMUbCHAIh2Ht1CrR5dO:3cZtPLq9I2lw8UbTIh2Nsrt
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-