General
-
Target
68cdf592d734d504d62b9edb87acbbf01b5ee9a3dbbf3ecc210917330f92e220
-
Size
213KB
-
Sample
221016-j3fgfahbd6
-
MD5
3172224a07d21abad4088793928a93ff
-
SHA1
0f240f43000377c99a22e9097168fd0e1430fd02
-
SHA256
68cdf592d734d504d62b9edb87acbbf01b5ee9a3dbbf3ecc210917330f92e220
-
SHA512
638a16b775570cb4cbd611c9a166366ab8676d9623fb8857b5c322ca794cdbf69d1bda1eaeebd160d230ef426455c6d452b0d6410afa3a9d9ec7701554822e4f
-
SSDEEP
3072:RAFXpxfHsJhV6L5FZOg8Q6yB5FIS249/o8+ekpQiUyQdI00KqdKUVh5:RABPHwkL5FJ6yaSS1WiUDI00DP
Static task
static1
Malware Config
Extracted
danabot
192.236.233.188:443
192.119.70.159:443
23.106.124.171:443
213.227.155.103:443
49.0.50.0:57
51.0.52.0:0
53.0.54.0:1200
55.0.56.0:65535
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Targets
-
-
Target
68cdf592d734d504d62b9edb87acbbf01b5ee9a3dbbf3ecc210917330f92e220
-
Size
213KB
-
MD5
3172224a07d21abad4088793928a93ff
-
SHA1
0f240f43000377c99a22e9097168fd0e1430fd02
-
SHA256
68cdf592d734d504d62b9edb87acbbf01b5ee9a3dbbf3ecc210917330f92e220
-
SHA512
638a16b775570cb4cbd611c9a166366ab8676d9623fb8857b5c322ca794cdbf69d1bda1eaeebd160d230ef426455c6d452b0d6410afa3a9d9ec7701554822e4f
-
SSDEEP
3072:RAFXpxfHsJhV6L5FZOg8Q6yB5FIS249/o8+ekpQiUyQdI00KqdKUVh5:RABPHwkL5FJ6yaSS1WiUDI00DP
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-