General
-
Target
e5feac9da811296081b00f656320faf4ff21c2a7c62b154852e0d4718e4c77b5
-
Size
214KB
-
Sample
221016-kc5jbahbe6
-
MD5
a6400b3a3e6e7c26ad46aaa641525d78
-
SHA1
de95f3d6c9cc61dc7d7fe420f06dab11870b22c1
-
SHA256
e5feac9da811296081b00f656320faf4ff21c2a7c62b154852e0d4718e4c77b5
-
SHA512
076945103127eb9616848db840400a2f1607240e8f92be167074facc860e26c6754e7526a22438c1763535c97c2c0c550a4a825f5190bf0023edc7747d6b4c26
-
SSDEEP
3072:YXpssZHJML2FYAg18P9MJ5J2U2h8Y1k45Db7Q7xGtP0KisgW:stZH6L2FHPSJ2qY1k45/7WwP08
Static task
static1
Malware Config
Extracted
danabot
192.236.233.188:443
192.119.70.159:443
23.106.124.171:443
213.227.155.103:443
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Targets
-
-
Target
e5feac9da811296081b00f656320faf4ff21c2a7c62b154852e0d4718e4c77b5
-
Size
214KB
-
MD5
a6400b3a3e6e7c26ad46aaa641525d78
-
SHA1
de95f3d6c9cc61dc7d7fe420f06dab11870b22c1
-
SHA256
e5feac9da811296081b00f656320faf4ff21c2a7c62b154852e0d4718e4c77b5
-
SHA512
076945103127eb9616848db840400a2f1607240e8f92be167074facc860e26c6754e7526a22438c1763535c97c2c0c550a4a825f5190bf0023edc7747d6b4c26
-
SSDEEP
3072:YXpssZHJML2FYAg18P9MJ5J2U2h8Y1k45Db7Q7xGtP0KisgW:stZH6L2FHPSJ2qY1k45/7WwP08
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-