General
-
Target
a4eaffeaa8d3e7d97e5f07910eaab89e6b2af55672590a2bebf23982c489aee7.exe
-
Size
18.8MB
-
Sample
241130-ypvrjaxngn
-
MD5
ca0779d9e66bc107c13c0479b9fed977
-
SHA1
e7c5ef7ec390aad8fc2b2e1edf470181e9f524f3
-
SHA256
a4eaffeaa8d3e7d97e5f07910eaab89e6b2af55672590a2bebf23982c489aee7
-
SHA512
3cddef7bf9f7308f444e47865858d9591de6ff37009d1b58a441cd5ba78342a1908c8ae91450eaaa671f746d08cfb227f6a397a7479c9576fa9c4c6faf990901
-
SSDEEP
98304:JicU/ooWRbog8zGnUVB1ucXzVcQedKvPaW7IXHUcPUljApAYA6dw3:I9VBocXzpPl7IXUcPUlGA
Static task
static1
Behavioral task
behavioral1
Sample
a4eaffeaa8d3e7d97e5f07910eaab89e6b2af55672590a2bebf23982c489aee7.exe
Resource
win7-20240729-en
Malware Config
Extracted
danabot
-
type
loader
Targets
-
-
Target
a4eaffeaa8d3e7d97e5f07910eaab89e6b2af55672590a2bebf23982c489aee7.exe
-
Size
18.8MB
-
MD5
ca0779d9e66bc107c13c0479b9fed977
-
SHA1
e7c5ef7ec390aad8fc2b2e1edf470181e9f524f3
-
SHA256
a4eaffeaa8d3e7d97e5f07910eaab89e6b2af55672590a2bebf23982c489aee7
-
SHA512
3cddef7bf9f7308f444e47865858d9591de6ff37009d1b58a441cd5ba78342a1908c8ae91450eaaa671f746d08cfb227f6a397a7479c9576fa9c4c6faf990901
-
SSDEEP
98304:JicU/ooWRbog8zGnUVB1ucXzVcQedKvPaW7IXHUcPUljApAYA6dw3:I9VBocXzpPl7IXUcPUlGA
-
Danabot family
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-