General
-
Target
8de0331321f997f4ec2ab18ccf1854f1cbb721130584412f61eccc510b0dffb1
-
Size
3.6MB
-
Sample
221220-rv8f9aaa44
-
MD5
47cd3545fdf1ad616dce8f5535a8a03f
-
SHA1
6b48cbcfccfc4ae5546eb3a99e069ee1f6bd712f
-
SHA256
8de0331321f997f4ec2ab18ccf1854f1cbb721130584412f61eccc510b0dffb1
-
SHA512
e3b8e2d890148888783f085edc5ddf2f7931c65f20388da8295a0627738ce966d91d17145afc9428a09501850a796b0bd16c1e0220ca646fc556c6c9097b8c2d
-
SSDEEP
49152:zjvWrU4VyUHA3iRYoySMbSsigAh14tKS2lw4I0LGAEwxQGV3O:3wU4VyUHpRYoESsigAlyJ
Behavioral task
behavioral1
Sample
8de0331321f997f4ec2ab18ccf1854f1cbb721130584412f61eccc510b0dffb1.exe
Resource
win7-20220812-en
Malware Config
Extracted
danabot
23.236.181.126:443
123.253.35.251:443
66.85.173.3:443
-
embedded_hash
8F56CD73F6B5CD5D7B17B0BA61E70A82
-
type
loader
Targets
-
-
Target
8de0331321f997f4ec2ab18ccf1854f1cbb721130584412f61eccc510b0dffb1
-
Size
3.6MB
-
MD5
47cd3545fdf1ad616dce8f5535a8a03f
-
SHA1
6b48cbcfccfc4ae5546eb3a99e069ee1f6bd712f
-
SHA256
8de0331321f997f4ec2ab18ccf1854f1cbb721130584412f61eccc510b0dffb1
-
SHA512
e3b8e2d890148888783f085edc5ddf2f7931c65f20388da8295a0627738ce966d91d17145afc9428a09501850a796b0bd16c1e0220ca646fc556c6c9097b8c2d
-
SSDEEP
49152:zjvWrU4VyUHA3iRYoySMbSsigAh14tKS2lw4I0LGAEwxQGV3O:3wU4VyUHpRYoESsigAlyJ
Score10/10-
Blocklisted process makes network request
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-