General
-
Target
88758290d488d18df2d88bf750d3c4dd49538f240702f9225df933fea6b1a6f1
-
Size
230KB
-
Sample
221025-e4cdysbeh5
-
MD5
67697a4abb3c1e9cbc298995feb271f6
-
SHA1
7391b50e30805bba9aa22581b6fac2a16d3fbd48
-
SHA256
88758290d488d18df2d88bf750d3c4dd49538f240702f9225df933fea6b1a6f1
-
SHA512
6a54153d0ac75ad1d3fa5d2ad002cc0a779a3d9e28c3a9aa32d9f482bd0e755fb3e05d051a5123fb8a622801772fe52fb65b29d9000bb9941c180e7df0e6c64a
-
SSDEEP
3072:RXs1GeLjvwZWY5tlzN6zvOR4DNS5Qzb2xxHDpEriYlu3ET8PRCl:15eL8ZWcgsQGHDplU4PRCl
Static task
static1
Malware Config
Extracted
danabot
-
embedded_hash
569235DCA8F16ED8310BBACCB674F896
-
type
loader
Extracted
vidar
55.2
937
https://t.me/slivetalks
https://c.im/@xinibin420
-
profile_id
937
Targets
-
-
Target
88758290d488d18df2d88bf750d3c4dd49538f240702f9225df933fea6b1a6f1
-
Size
230KB
-
MD5
67697a4abb3c1e9cbc298995feb271f6
-
SHA1
7391b50e30805bba9aa22581b6fac2a16d3fbd48
-
SHA256
88758290d488d18df2d88bf750d3c4dd49538f240702f9225df933fea6b1a6f1
-
SHA512
6a54153d0ac75ad1d3fa5d2ad002cc0a779a3d9e28c3a9aa32d9f482bd0e755fb3e05d051a5123fb8a622801772fe52fb65b29d9000bb9941c180e7df0e6c64a
-
SSDEEP
3072:RXs1GeLjvwZWY5tlzN6zvOR4DNS5Qzb2xxHDpEriYlu3ET8PRCl:15eL8ZWcgsQGHDplU4PRCl
-
Detects Smokeloader packer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-