General
-
Target
cbbf11437454890e0fd1aa7dc52f673278167086be223d98a150ee442e46e990
-
Size
214KB
-
Sample
221218-q3xjaacb86
-
MD5
30d9d1c7e72b46e65041398f611cf11c
-
SHA1
f67c7b6f2d885df78ba6f592946c36be6ed4e9da
-
SHA256
cbbf11437454890e0fd1aa7dc52f673278167086be223d98a150ee442e46e990
-
SHA512
3c11f8772aed1a7c68dec663d41ee899fe816a1ed37d31f1e3af245328141bee0f077575712c2dcd350ef435c62defea0e4caf78e3f9e5f363f0f79fe41f2298
-
SSDEEP
3072:KBwHoLP21Rv0lS7NtXfOaEGUJjTeN5g3um/obHtHOil3lk025PH:G7LuL0aXfJmFTn+m/AtjlVklPH
Static task
static1
Behavioral task
behavioral1
Sample
cbbf11437454890e0fd1aa7dc52f673278167086be223d98a150ee442e46e990.exe
Resource
win10-20220812-en
Malware Config
Extracted
danabot
23.236.181.126:443
123.253.35.251:443
66.85.173.3:443
-
embedded_hash
8F56CD73F6B5CD5D7B17B0BA61E70A82
-
type
loader
Targets
-
-
Target
cbbf11437454890e0fd1aa7dc52f673278167086be223d98a150ee442e46e990
-
Size
214KB
-
MD5
30d9d1c7e72b46e65041398f611cf11c
-
SHA1
f67c7b6f2d885df78ba6f592946c36be6ed4e9da
-
SHA256
cbbf11437454890e0fd1aa7dc52f673278167086be223d98a150ee442e46e990
-
SHA512
3c11f8772aed1a7c68dec663d41ee899fe816a1ed37d31f1e3af245328141bee0f077575712c2dcd350ef435c62defea0e4caf78e3f9e5f363f0f79fe41f2298
-
SSDEEP
3072:KBwHoLP21Rv0lS7NtXfOaEGUJjTeN5g3um/obHtHOil3lk025PH:G7LuL0aXfJmFTn+m/AtjlVklPH
Score10/10-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-