General
-
Target
YE.jpg
-
Size
1.9MB
-
Sample
240304-jd2ndada41
-
MD5
db00d76d920d8d9e1a01a0d278d64f0f
-
SHA1
321535469be98ff53be76621c10027ab0d14bc15
-
SHA256
806fb0b10366bb1923a9d4e4545ab76d589a1848eb758c978bc349ca86b22c54
-
SHA512
86950248bed2ad1199d9ded6f74318fe86ee52af99b420dff9101839c9757f816b7629b251fcd867078082a3db48deeb8a1925b2ef73dd0ebae646bac4a62676
-
SSDEEP
49152:pzMD+O974EJW3DyQFXC2p1WuO9WYFNmPR4X50IepawQWAs:pzMDXCiQXFhytNwc50pawQG
Static task
static1
Malware Config
Extracted
https://erpoweredent.at/3/zte.dll
Extracted
danabot
51.178.195.151
51.222.39.81
149.255.35.125
38.68.50.179
51.77.7.204
Targets
-
-
Target
YE.jpg
-
Size
1.9MB
-
MD5
db00d76d920d8d9e1a01a0d278d64f0f
-
SHA1
321535469be98ff53be76621c10027ab0d14bc15
-
SHA256
806fb0b10366bb1923a9d4e4545ab76d589a1848eb758c978bc349ca86b22c54
-
SHA512
86950248bed2ad1199d9ded6f74318fe86ee52af99b420dff9101839c9757f816b7629b251fcd867078082a3db48deeb8a1925b2ef73dd0ebae646bac4a62676
-
SSDEEP
49152:pzMD+O974EJW3DyQFXC2p1WuO9WYFNmPR4X50IepawQWAs:pzMDXCiQXFhytNwc50pawQG
-
Danabot x86 payload
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-