General

  • Target

    8021a42dcacc5324aa57d3f9dc1ec637.exe

  • Size

    2.7MB

  • Sample

    201109-chhxdh8h6e

  • MD5

    8021a42dcacc5324aa57d3f9dc1ec637

  • SHA1

    f4f08ba357d23403e2354d8e2be7acbccc266e55

  • SHA256

    94b9908c1d164acb68a30bacada251782c6e9dc64500718d12ebe4abf871b305

  • SHA512

    acb2fc354d4bf97740a43407ad4df3a744c92b0b8e10c480a898a96bc26d8f2594e82ec80ed1999b69f603f883cc824d2cb34d05a50937632888589c847c7949

Malware Config

Extracted

Family

danabot

C2

51.77.7.204

51.178.195.151

51.222.39.81

185.227.138.47

rsa_pubkey.plain

Targets

    • Target

      8021a42dcacc5324aa57d3f9dc1ec637.exe

    • Size

      2.7MB

    • MD5

      8021a42dcacc5324aa57d3f9dc1ec637

    • SHA1

      f4f08ba357d23403e2354d8e2be7acbccc266e55

    • SHA256

      94b9908c1d164acb68a30bacada251782c6e9dc64500718d12ebe4abf871b305

    • SHA512

      acb2fc354d4bf97740a43407ad4df3a744c92b0b8e10c480a898a96bc26d8f2594e82ec80ed1999b69f603f883cc824d2cb34d05a50937632888589c847c7949

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks