General

  • Target

    SecuriteInfo.com.Generic.mg.dec2c01b313433c6.16343

  • Size

    2.6MB

  • Sample

    200624-h7dbdjs55n

  • MD5

    dec2c01b313433c63b78663a9942cf2f

  • SHA1

    cbab780c240603f708e7108cb731be7110e35ffa

  • SHA256

    1263dd9dfbc368f565f8c2778e9b7c326c5e61fa8f3b57b114851fb69b1dc453

  • SHA512

    b1d4fde2fefcd172880ed9785ff7469f68b6ca80ffd3ec312efd890b3df3acdb6cc38db7d2dbd373c4fc7c062faeb9b54e57a918dbad5074f6baaa30587891f2

Malware Config

Extracted

Family

danabot

C2

92.204.160.126

193.34.166.26

93.115.22.159

93.115.22.165

185.227.138.52

rsa_pubkey.plain

Targets

    • Target

      SecuriteInfo.com.Generic.mg.dec2c01b313433c6.16343

    • Size

      2.6MB

    • MD5

      dec2c01b313433c63b78663a9942cf2f

    • SHA1

      cbab780c240603f708e7108cb731be7110e35ffa

    • SHA256

      1263dd9dfbc368f565f8c2778e9b7c326c5e61fa8f3b57b114851fb69b1dc453

    • SHA512

      b1d4fde2fefcd172880ed9785ff7469f68b6ca80ffd3ec312efd890b3df3acdb6cc38db7d2dbd373c4fc7c062faeb9b54e57a918dbad5074f6baaa30587891f2

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks