General
-
Target
ac3cf4cc11b0b3e744b4685be1b9a81a63fc507702864bdebd165b939e99f549
-
Size
3.6MB
-
Sample
221220-rvl81saa35
-
MD5
2d5452372ed89a637202f5c4311d6b83
-
SHA1
70f812ddb79efec13fb89c30d29ac9abbc17d623
-
SHA256
ac3cf4cc11b0b3e744b4685be1b9a81a63fc507702864bdebd165b939e99f549
-
SHA512
4ad38958af05f101fa07c90a78857af24f641e299315d039596af0c4669095ba68838b0f5a2ba78bf070e143ada84b2a82e25ba004791ee696d9491470bbaba7
-
SSDEEP
49152:zjvWrU4VyUHA3iRYoySMbSsigAh14tKS2lw4I0LGAEJxQGV3O:3wU4VyUHpRYoESsigAlyG
Behavioral task
behavioral1
Sample
ac3cf4cc11b0b3e744b4685be1b9a81a63fc507702864bdebd165b939e99f549.exe
Resource
win7-20220901-en
Malware Config
Extracted
danabot
23.236.181.126:443
123.253.35.251:443
66.85.173.3:443
-
embedded_hash
8F56CD73F6B5CD5D7B17B0BA61E70A82
-
type
loader
Targets
-
-
Target
ac3cf4cc11b0b3e744b4685be1b9a81a63fc507702864bdebd165b939e99f549
-
Size
3.6MB
-
MD5
2d5452372ed89a637202f5c4311d6b83
-
SHA1
70f812ddb79efec13fb89c30d29ac9abbc17d623
-
SHA256
ac3cf4cc11b0b3e744b4685be1b9a81a63fc507702864bdebd165b939e99f549
-
SHA512
4ad38958af05f101fa07c90a78857af24f641e299315d039596af0c4669095ba68838b0f5a2ba78bf070e143ada84b2a82e25ba004791ee696d9491470bbaba7
-
SSDEEP
49152:zjvWrU4VyUHA3iRYoySMbSsigAh14tKS2lw4I0LGAEJxQGV3O:3wU4VyUHpRYoESsigAlyG
Score10/10-
Blocklisted process makes network request
-
Sets DLL path for service in the registry
-
Sets service image path in registry
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Suspicious use of SetThreadContext
-