General
-
Target
a3d28f731471099e48459be1b1be2b8c4ef17147fa1946ca49cc75815e49cded
-
Size
200KB
-
Sample
221018-mkd3fafdf3
-
MD5
bdc2da55adc8e7ebf1dd52759e64043b
-
SHA1
b6fc52dbe086dad5c506a75af3b6766109b9f8d8
-
SHA256
a3d28f731471099e48459be1b1be2b8c4ef17147fa1946ca49cc75815e49cded
-
SHA512
b300f53960987331747c38e687447720d2088edac7c5484290cc7f932bd1d960d388aa6feb2c5d4cc100b0142f2b16de052d9306694b0f6e157a589677d1cb9f
-
SSDEEP
3072:AXhZB1LW5EzW52+4Nup0GPU1kB+9EV0KfPGhqI5B:0/B1L5zR+4v1jA04Ne
Static task
static1
Malware Config
Extracted
danabot
192.236.233.188:443
192.119.70.159:443
23.106.124.171:443
213.227.155.103:443
49.0.50.0:57
51.0.52.0:0
53.0.54.0:1200
55.0.56.0:65535
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Targets
-
-
Target
a3d28f731471099e48459be1b1be2b8c4ef17147fa1946ca49cc75815e49cded
-
Size
200KB
-
MD5
bdc2da55adc8e7ebf1dd52759e64043b
-
SHA1
b6fc52dbe086dad5c506a75af3b6766109b9f8d8
-
SHA256
a3d28f731471099e48459be1b1be2b8c4ef17147fa1946ca49cc75815e49cded
-
SHA512
b300f53960987331747c38e687447720d2088edac7c5484290cc7f932bd1d960d388aa6feb2c5d4cc100b0142f2b16de052d9306694b0f6e157a589677d1cb9f
-
SSDEEP
3072:AXhZB1LW5EzW52+4Nup0GPU1kB+9EV0KfPGhqI5B:0/B1L5zR+4v1jA04Ne
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-