General

  • Target

    d90d31166b4e5fe2d763e3f9e8196582.exe

  • Size

    2.7MB

  • Sample

    201109-cczyrctlfe

  • MD5

    d90d31166b4e5fe2d763e3f9e8196582

  • SHA1

    0923d9d7d871462c1583e0d9e5e71dd8da009e38

  • SHA256

    35b24b298440862cc09ac6a515297301ec56845de52375b67f1463cb9d210eaa

  • SHA512

    32f348cb976c1cc54a8b404bc188ea0b2c3069daa995fe69ffaa352d7502086a1cff7017e2cc9326c052c38f063a064c4cb8eac0f6cf1648c5794ec11964f335

Malware Config

Extracted

Family

danabot

C2

185.227.138.47

38.68.50.140

2.56.212.64

38.68.50.172

172.241.27.92

193.34.167.159

179.43.133.50

rsa_pubkey.plain

Targets

    • Target

      d90d31166b4e5fe2d763e3f9e8196582.exe

    • Size

      2.7MB

    • MD5

      d90d31166b4e5fe2d763e3f9e8196582

    • SHA1

      0923d9d7d871462c1583e0d9e5e71dd8da009e38

    • SHA256

      35b24b298440862cc09ac6a515297301ec56845de52375b67f1463cb9d210eaa

    • SHA512

      32f348cb976c1cc54a8b404bc188ea0b2c3069daa995fe69ffaa352d7502086a1cff7017e2cc9326c052c38f063a064c4cb8eac0f6cf1648c5794ec11964f335

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks