General
-
Target
D5BE5A97DAAA1652B2387EEC8B03DD789EC8660517EF2.exe
-
Size
201KB
-
Sample
221025-g7rzxsbgc5
-
MD5
9fa7845c6ecfd795662086b16519eef3
-
SHA1
dd1a12c6f82bc1c5ec5ffea48477861f871c34db
-
SHA256
d5be5a97daaa1652b2387eec8b03dd789ec8660517ef2c5fb0253b54f627528a
-
SHA512
5cbf803c047bb920f3d7dcea5d3de5b76b5ab71e204d368e12426fcc6e8ffd58e08bf2ab2f42d58daeb7267fd2668e2dfd145359b36e6929b5a48f82fe5117ad
-
SSDEEP
3072:IXwsvbzcAHLfY1odjHkDMLyVI8aQluJ56mCCdNQubb6XVDO8Ugc:cYAHLw1odt2LTuDuKWAbnv
Static task
static1
Behavioral task
behavioral1
Sample
D5BE5A97DAAA1652B2387EEC8B03DD789EC8660517EF2.exe
Resource
win7-20220901-en
Malware Config
Extracted
danabot
49.0.50.0:57
51.0.52.0:0
53.0.54.0:1200
55.0.56.0:65535
-
embedded_hash
569235DCA8F16ED8310BBACCB674F896
-
type
loader
Extracted
vidar
55.2
937
https://t.me/slivetalks
https://c.im/@xinibin420
-
profile_id
937
Targets
-
-
Target
D5BE5A97DAAA1652B2387EEC8B03DD789EC8660517EF2.exe
-
Size
201KB
-
MD5
9fa7845c6ecfd795662086b16519eef3
-
SHA1
dd1a12c6f82bc1c5ec5ffea48477861f871c34db
-
SHA256
d5be5a97daaa1652b2387eec8b03dd789ec8660517ef2c5fb0253b54f627528a
-
SHA512
5cbf803c047bb920f3d7dcea5d3de5b76b5ab71e204d368e12426fcc6e8ffd58e08bf2ab2f42d58daeb7267fd2668e2dfd145359b36e6929b5a48f82fe5117ad
-
SSDEEP
3072:IXwsvbzcAHLfY1odjHkDMLyVI8aQluJ56mCCdNQubb6XVDO8Ugc:cYAHLw1odt2LTuDuKWAbnv
-
Detects Smokeloader packer
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-