General
-
Target
SecuriteInfo.com.Variant.Danabot.2.4814.9051
-
Size
940KB
-
Sample
201109-gv3npkv6hn
-
MD5
b1e5cc8b0b26ca63431f37366bf59ad0
-
SHA1
f987d4917b7c86809b801d9187917fe7b14969c8
-
SHA256
e127b93395eb2d0cf5b3b1e43257b342fb51f7b68e55615aed0366c2d313b875
-
SHA512
8fb73ab6449a2bd5cda26ee6326ac748f4f31ee9ee9e995f18cc75dce53c39c53d4fb2d78a9115f5348e6fcc242e88d68a3c035306b532e55deff0d30c5730f1
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Danabot.2.4814.9051.exe
Resource
win7v20201028
Malware Config
Extracted
danabot
54.38.22.65
192.99.219.207
51.255.134.130
192.236.179.73
23.82.140.201
172.81.129.196
Targets
-
-
Target
SecuriteInfo.com.Variant.Danabot.2.4814.9051
-
Size
940KB
-
MD5
b1e5cc8b0b26ca63431f37366bf59ad0
-
SHA1
f987d4917b7c86809b801d9187917fe7b14969c8
-
SHA256
e127b93395eb2d0cf5b3b1e43257b342fb51f7b68e55615aed0366c2d313b875
-
SHA512
8fb73ab6449a2bd5cda26ee6326ac748f4f31ee9ee9e995f18cc75dce53c39c53d4fb2d78a9115f5348e6fcc242e88d68a3c035306b532e55deff0d30c5730f1
-
Danabot x86 payload
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
-
Blocklisted process makes network request
-
Loads dropped DLL
-