General
-
Target
file.exe
-
Size
215KB
-
Sample
221217-2ydfdshh98
-
MD5
94365d9093401c559f6a9fa7c6c75ebf
-
SHA1
e852fbedf7a54f6f1839264981aa8ddb2b5f2e65
-
SHA256
38894b4b04e75fcce4436e91738547306d2ef996d7abb176137d5af325f6424e
-
SHA512
fe2d505a3be0fc1f0d31e251104a090f156cd9af38bd644da94dd3f0fb268bdff3fe104f0b57b273ed301d79e5ee49b96113d9c2d4f5d6614d70d28dcf442750
-
SSDEEP
3072:T5GX0LBLHQZwRlOvxqwsQhWv7w2dM0s8/g3xozM9QPF3jrG3ERWR3Le:9GX+BLHQjyOU7w2MUg3CzM9QV6U0V6
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Malware Config
Extracted
danabot
23.236.181.126:443
123.253.35.251:443
66.85.173.3:443
-
embedded_hash
8F56CD73F6B5CD5D7B17B0BA61E70A82
-
type
loader
Targets
-
-
Target
file.exe
-
Size
215KB
-
MD5
94365d9093401c559f6a9fa7c6c75ebf
-
SHA1
e852fbedf7a54f6f1839264981aa8ddb2b5f2e65
-
SHA256
38894b4b04e75fcce4436e91738547306d2ef996d7abb176137d5af325f6424e
-
SHA512
fe2d505a3be0fc1f0d31e251104a090f156cd9af38bd644da94dd3f0fb268bdff3fe104f0b57b273ed301d79e5ee49b96113d9c2d4f5d6614d70d28dcf442750
-
SSDEEP
3072:T5GX0LBLHQZwRlOvxqwsQhWv7w2dM0s8/g3xozM9QPF3jrG3ERWR3Le:9GX+BLHQjyOU7w2MUg3CzM9QV6U0V6
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-