General
-
Target
ab819ce8b356bb43f8bd713df91ebdd74fa16347b07d5851fb6db9d7bad3b992
-
Size
232KB
-
Sample
221014-tc4rfsdggp
-
MD5
58836f25c259f6aba72b817d28806743
-
SHA1
310cae3f833222c296cf435c957fb0e1960964c1
-
SHA256
ab819ce8b356bb43f8bd713df91ebdd74fa16347b07d5851fb6db9d7bad3b992
-
SHA512
429a9c5ba83b028878203a81054c5488cc3e45a6a403229cafb1bf194aa4752daf54ce4e1539064cf9825a75f739fbfbc0ca695a30c9c13ce2f308f4b1fe929a
-
SSDEEP
3072:PpXNpp5pPVoucgrzvpG5r5CaFUcglOIxL5H31nT7gO0KOKqtGwsBnOE:17pPnfvC3ju3lT7gO0bKQGwwB
Static task
static1
Malware Config
Extracted
danabot
192.236.233.188:443
192.119.70.159:443
23.106.124.171:443
213.227.155.103:443
49.0.50.0:57
51.0.52.0:0
53.0.54.0:1200
55.0.56.0:65535
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Targets
-
-
Target
ab819ce8b356bb43f8bd713df91ebdd74fa16347b07d5851fb6db9d7bad3b992
-
Size
232KB
-
MD5
58836f25c259f6aba72b817d28806743
-
SHA1
310cae3f833222c296cf435c957fb0e1960964c1
-
SHA256
ab819ce8b356bb43f8bd713df91ebdd74fa16347b07d5851fb6db9d7bad3b992
-
SHA512
429a9c5ba83b028878203a81054c5488cc3e45a6a403229cafb1bf194aa4752daf54ce4e1539064cf9825a75f739fbfbc0ca695a30c9c13ce2f308f4b1fe929a
-
SSDEEP
3072:PpXNpp5pPVoucgrzvpG5r5CaFUcglOIxL5H31nT7gO0KOKqtGwsBnOE:17pPnfvC3ju3lT7gO0bKQGwwB
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-