General

  • Target

    SecuriteInfo.com.Generic.mg.cc71bdb3d4b7d7ee.16690

  • Size

    2.6MB

  • Sample

    200624-zsx629g6ea

  • MD5

    cc71bdb3d4b7d7ee07e7a930604ec05e

  • SHA1

    bc9df0208c08ace9a910fbe8507bba1ab1588b5d

  • SHA256

    ed22f2dca8b71427cc4b0f0124fb4bcbe7790e83a3617a596befc79e5040c92a

  • SHA512

    0939eab2fbf98d2b5186ecfba3297debbcf37a57ac0dc319078d7a36fa73f6b6e81b357c8f8dc816974327051c7d36fda7bc4b217edd563f0ce923772eb347e7

Malware Config

Extracted

Family

danabot

C2

92.204.160.126

193.34.166.26

93.115.22.159

93.115.22.165

185.227.138.52

rsa_pubkey.plain

Targets

    • Target

      SecuriteInfo.com.Generic.mg.cc71bdb3d4b7d7ee.16690

    • Size

      2.6MB

    • MD5

      cc71bdb3d4b7d7ee07e7a930604ec05e

    • SHA1

      bc9df0208c08ace9a910fbe8507bba1ab1588b5d

    • SHA256

      ed22f2dca8b71427cc4b0f0124fb4bcbe7790e83a3617a596befc79e5040c92a

    • SHA512

      0939eab2fbf98d2b5186ecfba3297debbcf37a57ac0dc319078d7a36fa73f6b6e81b357c8f8dc816974327051c7d36fda7bc4b217edd563f0ce923772eb347e7

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks