General
-
Target
ac3cbbc36a7a5c9f551aca322dc0e19578d12a9bca3346cc5ff298e811f1b0f3
-
Size
141KB
-
Sample
221219-gnrvtahd21
-
MD5
32393294476b4999b30c44256ecce3e6
-
SHA1
9e7c9f23e216ee11a29206efcdd9d2738fa7b48c
-
SHA256
8df51fde93b22dabd68fcd3faa381b0872c5ecad20e1d9f4b1d226bb2177a861
-
SHA512
cfaa2dde7c564927a2577e3267465ebea06b62c9f4133ce4c718a9b5dbb3469db2dbc3ddc7b81f4f98c0abab2df86f8d571ab6ba99f79c9278f92538fa816b9e
-
SSDEEP
3072:rOVVZSRsia0eRpEOihARfTazAQMCzdwjiqcC4hsTLvoWaT4GU:rOiRuExhkWOCxwuqcOHw4
Static task
static1
Behavioral task
behavioral1
Sample
ac3cbbc36a7a5c9f551aca322dc0e19578d12a9bca3346cc5ff298e811f1b0f3.exe
Resource
win7-20221111-en
Malware Config
Extracted
danabot
49.0.50.0:57
51.0.52.0:0
53.0.54.0:1200
55.0.56.0:65535
-
type
loader
Targets
-
-
Target
ac3cbbc36a7a5c9f551aca322dc0e19578d12a9bca3346cc5ff298e811f1b0f3
-
Size
214KB
-
MD5
dbac1e546c31e01df2df4b2ebee2f2b5
-
SHA1
f7837f0e02f5c0e7f3dd5ad86ee9946e1a6c81d1
-
SHA256
ac3cbbc36a7a5c9f551aca322dc0e19578d12a9bca3346cc5ff298e811f1b0f3
-
SHA512
59772e87a7b596dda7afb9895fa00c5eaaacc423c8260f6c9bbca1b5218cc48424e12fb6c2d810252fbad8a8217b9d642c99dcb1d43c15d3a5228cd3cf9054e7
-
SSDEEP
3072:WwUBO36L+Zj21WClRB4cRO0BZyGiyctNRAtOba+3QnBtjcbImdzmuX:nUBNL+x21j9xRO0BZ/ct03BtjcbXF
-
Detects Smokeloader packer
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-