General
-
Target
SecuriteInfo.com.Generic.mg.cc71bdb3d4b7d7ee.16690
-
Size
2.6MB
-
Sample
200624-zsx629g6ea
-
MD5
cc71bdb3d4b7d7ee07e7a930604ec05e
-
SHA1
bc9df0208c08ace9a910fbe8507bba1ab1588b5d
-
SHA256
ed22f2dca8b71427cc4b0f0124fb4bcbe7790e83a3617a596befc79e5040c92a
-
SHA512
0939eab2fbf98d2b5186ecfba3297debbcf37a57ac0dc319078d7a36fa73f6b6e81b357c8f8dc816974327051c7d36fda7bc4b217edd563f0ce923772eb347e7
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Generic.mg.cc71bdb3d4b7d7ee.16690.exe
Resource
win7v200430
Malware Config
Extracted
danabot
92.204.160.126
193.34.166.26
93.115.22.159
93.115.22.165
185.227.138.52
Targets
-
-
Target
SecuriteInfo.com.Generic.mg.cc71bdb3d4b7d7ee.16690
-
Size
2.6MB
-
MD5
cc71bdb3d4b7d7ee07e7a930604ec05e
-
SHA1
bc9df0208c08ace9a910fbe8507bba1ab1588b5d
-
SHA256
ed22f2dca8b71427cc4b0f0124fb4bcbe7790e83a3617a596befc79e5040c92a
-
SHA512
0939eab2fbf98d2b5186ecfba3297debbcf37a57ac0dc319078d7a36fa73f6b6e81b357c8f8dc816974327051c7d36fda7bc4b217edd563f0ce923772eb347e7
-
Danabot x86 payload
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Blocklisted process makes network request
-
Loads dropped DLL
-