General
-
Target
b7ebdb408b0ec36e72eecb9521b56946397735bc1c1a07137a467070c3644b71
-
Size
221KB
-
Sample
221024-s7zwbahedn
-
MD5
1979cca332595ccfe763fe7ccb384759
-
SHA1
ba1501200de894132b961811bd546e718572c704
-
SHA256
b7ebdb408b0ec36e72eecb9521b56946397735bc1c1a07137a467070c3644b71
-
SHA512
ba5d49b45f7e6b84f001a59244b29b9b8e3b1d2cd074c4c5f5d3fe38eec6a48336732abd1ae35aed28d72104f6a2b8fb3a488bc27f790f79e9c2771801612eb9
-
SSDEEP
3072:Y5nlm5pOEhMLv98/wz6lk5yeNBbU95JbMjOusnPibrI1dKVpD14M2Gy:Y5ckLTz4ugFMLqiw1Iv54
Static task
static1
Malware Config
Extracted
danabot
-
embedded_hash
569235DCA8F16ED8310BBACCB674F896
-
type
loader
Extracted
vidar
55.2
937
https://t.me/slivetalks
https://c.im/@xinibin420
-
profile_id
937
Targets
-
-
Target
b7ebdb408b0ec36e72eecb9521b56946397735bc1c1a07137a467070c3644b71
-
Size
221KB
-
MD5
1979cca332595ccfe763fe7ccb384759
-
SHA1
ba1501200de894132b961811bd546e718572c704
-
SHA256
b7ebdb408b0ec36e72eecb9521b56946397735bc1c1a07137a467070c3644b71
-
SHA512
ba5d49b45f7e6b84f001a59244b29b9b8e3b1d2cd074c4c5f5d3fe38eec6a48336732abd1ae35aed28d72104f6a2b8fb3a488bc27f790f79e9c2771801612eb9
-
SSDEEP
3072:Y5nlm5pOEhMLv98/wz6lk5yeNBbU95JbMjOusnPibrI1dKVpD14M2Gy:Y5ckLTz4ugFMLqiw1Iv54
-
Detects Smokeloader packer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-