General
-
Target
SecuriteInfo.com.Generic.mg.dec2c01b313433c6.16343
-
Size
2.6MB
-
Sample
200624-h7dbdjs55n
-
MD5
dec2c01b313433c63b78663a9942cf2f
-
SHA1
cbab780c240603f708e7108cb731be7110e35ffa
-
SHA256
1263dd9dfbc368f565f8c2778e9b7c326c5e61fa8f3b57b114851fb69b1dc453
-
SHA512
b1d4fde2fefcd172880ed9785ff7469f68b6ca80ffd3ec312efd890b3df3acdb6cc38db7d2dbd373c4fc7c062faeb9b54e57a918dbad5074f6baaa30587891f2
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Generic.mg.dec2c01b313433c6.16343.exe
Resource
win7
Malware Config
Extracted
danabot
92.204.160.126
193.34.166.26
93.115.22.159
93.115.22.165
185.227.138.52
Targets
-
-
Target
SecuriteInfo.com.Generic.mg.dec2c01b313433c6.16343
-
Size
2.6MB
-
MD5
dec2c01b313433c63b78663a9942cf2f
-
SHA1
cbab780c240603f708e7108cb731be7110e35ffa
-
SHA256
1263dd9dfbc368f565f8c2778e9b7c326c5e61fa8f3b57b114851fb69b1dc453
-
SHA512
b1d4fde2fefcd172880ed9785ff7469f68b6ca80ffd3ec312efd890b3df3acdb6cc38db7d2dbd373c4fc7c062faeb9b54e57a918dbad5074f6baaa30587891f2
-
Danabot x86 payload
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Blocklisted process makes network request
-
Loads dropped DLL
-