General
-
Target
182b2fd847f91f5a381ce332366b9c8f.exe
-
Size
8.4MB
-
Sample
221025-njv51acecl
-
MD5
182b2fd847f91f5a381ce332366b9c8f
-
SHA1
0df2d790667dd74ce9964839f5b10b4c5a7c1442
-
SHA256
118452cc645ee44bc6fba61d70dff92f7297a28bee2849cd10b133e685ed8704
-
SHA512
7139a94b89e147e5b2051f823842d5e09f1134993430a96b491a197c31a073a34f8d72e94fe7160c464bf01775e7d157378bd381ca0bf0950488438409ee53da
-
SSDEEP
196608:QEepItIc2w6yTIxpvSxllzAiB/UO7vA1vK70abaBeIvveVJsSh:7NTIxRSz374k4de0eVJsc
Static task
static1
Behavioral task
behavioral1
Sample
182b2fd847f91f5a381ce332366b9c8f.exe
Resource
win7-20220812-en
Malware Config
Extracted
danabot
-
embedded_hash
569235DCA8F16ED8310BBACCB674F896
-
type
loader
Targets
-
-
Target
182b2fd847f91f5a381ce332366b9c8f.exe
-
Size
8.4MB
-
MD5
182b2fd847f91f5a381ce332366b9c8f
-
SHA1
0df2d790667dd74ce9964839f5b10b4c5a7c1442
-
SHA256
118452cc645ee44bc6fba61d70dff92f7297a28bee2849cd10b133e685ed8704
-
SHA512
7139a94b89e147e5b2051f823842d5e09f1134993430a96b491a197c31a073a34f8d72e94fe7160c464bf01775e7d157378bd381ca0bf0950488438409ee53da
-
SSDEEP
196608:QEepItIc2w6yTIxpvSxllzAiB/UO7vA1vK70abaBeIvveVJsSh:7NTIxRSz374k4de0eVJsc
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-