General
-
Target
ca0779d9e66bc107c13c0479b9fed977.bin
-
Size
7.4MB
-
Sample
241202-b665kasrcx
-
MD5
0b041674109485c3191acbef6f042863
-
SHA1
419b66db72ec2850acc094cd7ee019db488ea36d
-
SHA256
0786adf732ca54fe90225daf5745e329e18d6048cab72e15ccfe6f633fcd8860
-
SHA512
48a1e1322d4cf26f587478daec7ebe5f17360adf4a7e6ddf5c6d30039f6645f88031ab033a0862fe7dff2c662244b68ccfa48c68f388997c30305a8eaf337e1f
-
SSDEEP
196608:+Rm95FoUXjOGNESjgGWhqNXKAVI71akCxBftX:U0oQNEUpNXZIUkGR
Static task
static1
Behavioral task
behavioral1
Sample
a4eaffeaa8d3e7d97e5f07910eaab89e6b2af55672590a2bebf23982c489aee7.exe
Resource
win7-20240903-en
Malware Config
Extracted
danabot
-
type
loader
Targets
-
-
Target
a4eaffeaa8d3e7d97e5f07910eaab89e6b2af55672590a2bebf23982c489aee7.exe
-
Size
18.8MB
-
MD5
ca0779d9e66bc107c13c0479b9fed977
-
SHA1
e7c5ef7ec390aad8fc2b2e1edf470181e9f524f3
-
SHA256
a4eaffeaa8d3e7d97e5f07910eaab89e6b2af55672590a2bebf23982c489aee7
-
SHA512
3cddef7bf9f7308f444e47865858d9591de6ff37009d1b58a441cd5ba78342a1908c8ae91450eaaa671f746d08cfb227f6a397a7479c9576fa9c4c6faf990901
-
SSDEEP
98304:JicU/ooWRbog8zGnUVB1ucXzVcQedKvPaW7IXHUcPUljApAYA6dw3:I9VBocXzpPl7IXUcPUlGA
-
Danabot family
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-