General
-
Target
186efc26ace999808724cecc29182a6a348c0c4de8e18cbd40041dae2221ea77.a3x
-
Size
4.3MB
-
Sample
241204-ypeqbatqcm
-
MD5
08c6a7bcd8945856dfcc5bf247049586
-
SHA1
ada4b5594a44eba87d3afc23f182f452ba0dc7c9
-
SHA256
186efc26ace999808724cecc29182a6a348c0c4de8e18cbd40041dae2221ea77
-
SHA512
9089fa2655390bfe335a654743c718bc743a10ce042874c09e9093b6eab706c6a756a9b977c9f49874637f5ca99a112fc893dfcd9ab4582f9a5304a8a86de148
-
SSDEEP
98304:iwAdbxY2G3T5moaWIlyhe2UwB9W4WlTAXZRolhmwmxIXjuSA:IdFRINmoUyhd5BwvTAXZRolhmwmxIXj2
Static task
static1
Behavioral task
behavioral1
Sample
186efc26ace999808724cecc29182a6a348c0c4de8e18cbd40041dae2221ea77.a3x
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
186efc26ace999808724cecc29182a6a348c0c4de8e18cbd40041dae2221ea77.a3x
Resource
win10v2004-20241007-en
Malware Config
Extracted
danabot
49.0.50.0:57
51.0.52.0:0
53.0.54.0:1200
55.0.56.0:65535
-
type
loader
Targets
-
-
Target
186efc26ace999808724cecc29182a6a348c0c4de8e18cbd40041dae2221ea77.a3x
-
Size
4.3MB
-
MD5
08c6a7bcd8945856dfcc5bf247049586
-
SHA1
ada4b5594a44eba87d3afc23f182f452ba0dc7c9
-
SHA256
186efc26ace999808724cecc29182a6a348c0c4de8e18cbd40041dae2221ea77
-
SHA512
9089fa2655390bfe335a654743c718bc743a10ce042874c09e9093b6eab706c6a756a9b977c9f49874637f5ca99a112fc893dfcd9ab4582f9a5304a8a86de148
-
SSDEEP
98304:iwAdbxY2G3T5moaWIlyhe2UwB9W4WlTAXZRolhmwmxIXjuSA:IdFRINmoUyhd5BwvTAXZRolhmwmxIXj2
-
Danabot family
-
A potential corporate email address has been identified in the URL: [email protected]
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1