General
-
Target
b911d8dc00380696ca821a1ef90a5aede46ddc20ee7e459e4edc8583108ad34e
-
Size
243KB
-
Sample
221025-m2rd4acddr
-
MD5
e8b18e3aa941a9eccdd8a2b2f86b611c
-
SHA1
41a186b412a0f796baae314a4479890453fc46d1
-
SHA256
b911d8dc00380696ca821a1ef90a5aede46ddc20ee7e459e4edc8583108ad34e
-
SHA512
a7cbe8fcd2874784ac967a251830a2335e4b32eebf48686477c9655f6387652672e0aed7c351fbdf06d8ced10a59186be0b5bc5581df943f2a73141654aa3ee1
-
SSDEEP
3072:/XrbPdMLPg6lVKmdX5Ov6VNJ8z/4I30Vjn89r1e9kqdcNC7E1p3Koah4M7WMpij:vndMLnKmerw+1MG6cdWmPI2
Static task
static1
Malware Config
Extracted
danabot
49.0.50.0:57
51.0.52.0:0
53.0.54.0:1200
55.0.56.0:65535
-
embedded_hash
569235DCA8F16ED8310BBACCB674F896
-
type
loader
Extracted
vidar
55.2
937
https://t.me/slivetalks
https://c.im/@xinibin420
-
profile_id
937
Targets
-
-
Target
b911d8dc00380696ca821a1ef90a5aede46ddc20ee7e459e4edc8583108ad34e
-
Size
243KB
-
MD5
e8b18e3aa941a9eccdd8a2b2f86b611c
-
SHA1
41a186b412a0f796baae314a4479890453fc46d1
-
SHA256
b911d8dc00380696ca821a1ef90a5aede46ddc20ee7e459e4edc8583108ad34e
-
SHA512
a7cbe8fcd2874784ac967a251830a2335e4b32eebf48686477c9655f6387652672e0aed7c351fbdf06d8ced10a59186be0b5bc5581df943f2a73141654aa3ee1
-
SSDEEP
3072:/XrbPdMLPg6lVKmdX5Ov6VNJ8z/4I30Vjn89r1e9kqdcNC7E1p3Koah4M7WMpij:vndMLnKmerw+1MG6cdWmPI2
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-