General

  • Target

    5f8c7a8a8095a14d504172acff266239.exe

  • Size

    1.0MB

  • Sample

    201109-bk2s3wg6b6

  • MD5

    5f8c7a8a8095a14d504172acff266239

  • SHA1

    a7dadbba24f6b98f84b073f999dab22c9c8ecfd4

  • SHA256

    8c98355387cdad4550e82d642575634034955262583962b63617d8e2d79956bd

  • SHA512

    7fd6934999f755ca9bdbe02b98b3707febca1d8134f0461137eccf5e6a575fd9826a544805ef23ef9e8b05b47d3e6b2446d37d5fed1d6b228067c4d89111e134

Malware Config

Extracted

Family

danabot

C2

2.56.213.39

185.238.168.83

185.238.168.174

93.115.20.189

93.115.20.183

5.61.58.130

rsa_pubkey.plain

Targets

    • Target

      5f8c7a8a8095a14d504172acff266239.exe

    • Size

      1.0MB

    • MD5

      5f8c7a8a8095a14d504172acff266239

    • SHA1

      a7dadbba24f6b98f84b073f999dab22c9c8ecfd4

    • SHA256

      8c98355387cdad4550e82d642575634034955262583962b63617d8e2d79956bd

    • SHA512

      7fd6934999f755ca9bdbe02b98b3707febca1d8134f0461137eccf5e6a575fd9826a544805ef23ef9e8b05b47d3e6b2446d37d5fed1d6b228067c4d89111e134

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks