General
-
Target
d00026dde6dabd602275dc27d67b0796009cc8daa7a560829299abc327e9d744
-
Size
2.4MB
-
Sample
221218-pb241sbh38
-
MD5
457815e2d7d4312d942a90f08ae31b46
-
SHA1
ead9852021f47092aed31847a6c5d0f1bd196c99
-
SHA256
d00026dde6dabd602275dc27d67b0796009cc8daa7a560829299abc327e9d744
-
SHA512
255ab3b524b60935d2a89b743f641e9ab4b15eb392445294de78bbda3723adfdec9d5b65be75ee6914069a2e3451908caf6cf1ad2583c71110d9c2075518fde7
-
SSDEEP
49152:WVstoKaS3xQLNKb9fPNvTVURjDmgH/yAt32CiwGjJfW5P:gsfh3xQLyT+JnH6At32Cildfi
Static task
static1
Behavioral task
behavioral1
Sample
d00026dde6dabd602275dc27d67b0796009cc8daa7a560829299abc327e9d744.exe
Resource
win10-20220812-en
Malware Config
Extracted
danabot
23.236.181.126:443
123.253.35.251:443
66.85.173.3:443
-
embedded_hash
8F56CD73F6B5CD5D7B17B0BA61E70A82
-
type
loader
Targets
-
-
Target
d00026dde6dabd602275dc27d67b0796009cc8daa7a560829299abc327e9d744
-
Size
2.4MB
-
MD5
457815e2d7d4312d942a90f08ae31b46
-
SHA1
ead9852021f47092aed31847a6c5d0f1bd196c99
-
SHA256
d00026dde6dabd602275dc27d67b0796009cc8daa7a560829299abc327e9d744
-
SHA512
255ab3b524b60935d2a89b743f641e9ab4b15eb392445294de78bbda3723adfdec9d5b65be75ee6914069a2e3451908caf6cf1ad2583c71110d9c2075518fde7
-
SSDEEP
49152:WVstoKaS3xQLNKb9fPNvTVURjDmgH/yAt32CiwGjJfW5P:gsfh3xQLyT+JnH6At32Cildfi
Score10/10-
Blocklisted process makes network request
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-