MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 64ee4eb7d1ccb2e662bff8acb4f0b6659fe907f77f0e7e5478a53ebdd2311124. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DanaBot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 64ee4eb7d1ccb2e662bff8acb4f0b6659fe907f77f0e7e5478a53ebdd2311124
SHA3-384 hash: 8f2436b39dc4561601a9cc6b5e4f05a31d0d4e9b501e5511e470499c955d3b74d0f0907c96abf9c70d91bc2b8d9ff18f
SHA1 hash: abb9c703aa9444d7da21981b34638b7910410e92
MD5 hash: 18f549f91cb5447e8c4f868e13505c3f
humanhash: edward-california-texas-mexico
File name:18f549f91cb5447e8c4f868e13505c3f.exe
Download: download sample
Signature DanaBot
File size:1'235'968 bytes
First seen:2021-07-31 08:10:06 UTC
Last seen:2021-07-31 08:52:47 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 4de43a5962a4721ead959e24c980016c (4 x RaccoonStealer, 2 x RedLineStealer, 1 x DanaBot)
ssdeep 24576:5eHu2VpHOdVAV+mEsNUoI1k8C2XuFlFKklrt/DQ:oVAdVAVVjiPRC0eKert0
Threatray 3'162 similar samples on MalwareBazaar
TLSH T1484512306B90C035F4F752F88A7993B9693ABE506B3410CFA1D53AEE1635AE9DC30257
dhash icon ead8a89cc6e68ea0 (25 x RaccoonStealer, 8 x DanaBot, 8 x RedLineStealer)
Reporter abuse_ch
Tags:DanaBot exe

Intelligence


File Origin
# of uploads :
2
# of downloads :
985
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
18f549f91cb5447e8c4f868e13505c3f.exe
Verdict:
Malicious activity
Analysis date:
2021-07-31 08:24:54 UTC
Tags:
trojan danabot

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Malicious Packer
Verdict:
Malicious
Result
Threat name:
DanaBot
Detection:
malicious
Classification:
troj.evad
Score:
100 / 100
Signature
C2 URLs / IPs found in malware configuration
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected DanaBot stealer dll
Behaviour
Behavior Graph:
Threat name:
Win32.Infostealer.Racealer
Status:
Malicious
First seen:
2021-07-30 19:46:25 UTC
AV detection:
15 of 26 (57.69%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Drops file in Program Files directory
Loads dropped DLL
Blocklisted process makes network request
Unpacked files
SH256 hash:
6976f0e684aa623560779004e591bbab031bf300496c065670128f1139fa7acb
MD5 hash:
43d8af7ac782cd224707869027dc3225
SHA1 hash:
72e26d7d76fe48ab4871decadf82508750e61704
SH256 hash:
aa022fdaffa4ff139e982b152f374e89364664ea543c29ad88a024bf938e3784
MD5 hash:
fa17001152260843982607e6524ea9aa
SHA1 hash:
95ccaa81eabd140513520d638db108fb05d1d685
SH256 hash:
64ee4eb7d1ccb2e662bff8acb4f0b6659fe907f77f0e7e5478a53ebdd2311124
MD5 hash:
18f549f91cb5447e8c4f868e13505c3f
SHA1 hash:
abb9c703aa9444d7da21981b34638b7910410e92
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

DanaBot

Executable exe 64ee4eb7d1ccb2e662bff8acb4f0b6659fe907f77f0e7e5478a53ebdd2311124

(this sample)

Comments