General

  • Target

    9c4fade08ddee2e8d0dfc518414b188e6fd74f0d08260f8b2b9b1b0da3dc518e

  • Size

    2.6MB

  • Sample

    200629-rrt5d1yjhn

  • MD5

    b12860db0af66cd54096834f586a31f7

  • SHA1

    0407873ba5b9312f6f5d3a657721f054a74f4d87

  • SHA256

    9c4fade08ddee2e8d0dfc518414b188e6fd74f0d08260f8b2b9b1b0da3dc518e

  • SHA512

    0a252da57e3d104cb4f004cfb1faec931f110146804a04d6753579e7db2eeb007470bc9ec275daace4b133a10536340a291829cae977c57aa946cf661533203f

Malware Config

Extracted

Family

danabot

C2

137.74.66.92

185.227.138.52

192.236.146.249

172.93.201.168

193.34.166.244

23.83.133.10

rsa_pubkey.plain

Targets

    • Target

      9c4fade08ddee2e8d0dfc518414b188e6fd74f0d08260f8b2b9b1b0da3dc518e

    • Size

      2.6MB

    • MD5

      b12860db0af66cd54096834f586a31f7

    • SHA1

      0407873ba5b9312f6f5d3a657721f054a74f4d87

    • SHA256

      9c4fade08ddee2e8d0dfc518414b188e6fd74f0d08260f8b2b9b1b0da3dc518e

    • SHA512

      0a252da57e3d104cb4f004cfb1faec931f110146804a04d6753579e7db2eeb007470bc9ec275daace4b133a10536340a291829cae977c57aa946cf661533203f

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks