General
-
Target
db4ac7ce88831a31b4a8ba82b813569af1c81c1192a9e993686ce4e7c526f33a
-
Size
229KB
-
Sample
221020-b94tlsheer
-
MD5
ae38c8b118d149c7efb0b158b9f08fb5
-
SHA1
cc22af8e5f2f101ffd0edea3da066bb4a5eefd70
-
SHA256
db4ac7ce88831a31b4a8ba82b813569af1c81c1192a9e993686ce4e7c526f33a
-
SHA512
3c9b0a711c2d136ed4734d8f334986658d6193436fb585c3e096b22fa8c32dcfd99f0714e9e9c55b39b85e525d6a431faac42951d4a3e6c2ad07c29abb2d2e03
-
SSDEEP
3072:SGnEVZpZPthyZLma0XWOim9ytVyH/S8eCrzMziNeg6lTsSR:SGWppsLZ0XjpKtUM+6lX
Static task
static1
Malware Config
Extracted
danabot
192.236.233.188:443
192.119.70.159:443
23.106.124.171:443
213.227.155.103:443
49.0.50.0:57
51.0.52.0:0
53.0.54.0:1200
55.0.56.0:65535
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Targets
-
-
Target
db4ac7ce88831a31b4a8ba82b813569af1c81c1192a9e993686ce4e7c526f33a
-
Size
229KB
-
MD5
ae38c8b118d149c7efb0b158b9f08fb5
-
SHA1
cc22af8e5f2f101ffd0edea3da066bb4a5eefd70
-
SHA256
db4ac7ce88831a31b4a8ba82b813569af1c81c1192a9e993686ce4e7c526f33a
-
SHA512
3c9b0a711c2d136ed4734d8f334986658d6193436fb585c3e096b22fa8c32dcfd99f0714e9e9c55b39b85e525d6a431faac42951d4a3e6c2ad07c29abb2d2e03
-
SSDEEP
3072:SGnEVZpZPthyZLma0XWOim9ytVyH/S8eCrzMziNeg6lTsSR:SGWppsLZ0XjpKtUM+6lX
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-