General
-
Target
26b76e02a3c17266db13ede01234f998d40ca6c26d3b245fde268e3a26f32c8a
-
Size
1.3MB
-
Sample
221019-fgz26sfccr
-
MD5
77ab6e4c38323e6d681dd73aae1bb939
-
SHA1
35d058f859705ad65490db829ba0a0b9546b0934
-
SHA256
26b76e02a3c17266db13ede01234f998d40ca6c26d3b245fde268e3a26f32c8a
-
SHA512
091b8a8b213df8da8eab3b8b463570e5a5ba2d952e85e9c11a9a557fb6ff4c651b0358a22604d59ff7b433ec5f06e50cc0ce6b883d6050c749d65fe73e360e58
-
SSDEEP
24576:4Ym8y19MPo1Y+h6f10PsMEcje93m+orEcgS1tgjm3V:4YOXMyZh6fCsMEIe1Now5qg
Static task
static1
Malware Config
Extracted
danabot
192.236.233.188:443
192.119.70.159:443
23.106.124.171:443
213.227.155.103:443
49.0.50.0:57
51.0.52.0:0
53.0.54.0:1200
55.0.56.0:65535
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Targets
-
-
Target
26b76e02a3c17266db13ede01234f998d40ca6c26d3b245fde268e3a26f32c8a
-
Size
1.3MB
-
MD5
77ab6e4c38323e6d681dd73aae1bb939
-
SHA1
35d058f859705ad65490db829ba0a0b9546b0934
-
SHA256
26b76e02a3c17266db13ede01234f998d40ca6c26d3b245fde268e3a26f32c8a
-
SHA512
091b8a8b213df8da8eab3b8b463570e5a5ba2d952e85e9c11a9a557fb6ff4c651b0358a22604d59ff7b433ec5f06e50cc0ce6b883d6050c749d65fe73e360e58
-
SSDEEP
24576:4Ym8y19MPo1Y+h6f10PsMEcje93m+orEcgS1tgjm3V:4YOXMyZh6fCsMEIe1Now5qg
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-