General
-
Target
file.exe
-
Size
217KB
-
Sample
221027-ejg4psaedn
-
MD5
0ab3cd09cbd1e720bcdc7a207ba57b34
-
SHA1
e6869aada6e1825789e743a9420a25eab24ae09a
-
SHA256
c2774c6dcb4f2784b80e4c4e17e5d83147640c4a072a726a6ed04a7a35ffec5a
-
SHA512
674813858894328b9680ae9aa5a1cef73636270b773938e5fd9606661d1a2fdd0a3fd754278791ae24e0a893594287bea01e380ed17e78d97ca55e2bf0a24199
-
SSDEEP
3072:G4Bo3Lw8XbpUGLpoK267XOiT5Hh4itxeZg5fzQUymRlx2hxpc6x:lBslXFVLiK28XOe8ZmQDRxe6
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
danabot
172.86.120.215:443
213.227.155.103:443
103.187.26.147:443
172.86.120.138:443
-
embedded_hash
BBBB0DB8CB7E6D152424535822E445A7
-
type
loader
Targets
-
-
Target
file.exe
-
Size
217KB
-
MD5
0ab3cd09cbd1e720bcdc7a207ba57b34
-
SHA1
e6869aada6e1825789e743a9420a25eab24ae09a
-
SHA256
c2774c6dcb4f2784b80e4c4e17e5d83147640c4a072a726a6ed04a7a35ffec5a
-
SHA512
674813858894328b9680ae9aa5a1cef73636270b773938e5fd9606661d1a2fdd0a3fd754278791ae24e0a893594287bea01e380ed17e78d97ca55e2bf0a24199
-
SSDEEP
3072:G4Bo3Lw8XbpUGLpoK267XOiT5Hh4itxeZg5fzQUymRlx2hxpc6x:lBslXFVLiK28XOe8ZmQDRxe6
Score10/10-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-