General

  • Target

    dc825fb0f3c7fb28693590a4a5c1cc7f.exe

  • Size

    2.7MB

  • Sample

    201109-nbveavcmm6

  • MD5

    dc825fb0f3c7fb28693590a4a5c1cc7f

  • SHA1

    6d1a2bf886509558c876c82e94465ce0b1fa0b4d

  • SHA256

    677f90dd4838bff9c07d1f730907777ce27bdf40cca7a7a664cf675cf33b4622

  • SHA512

    4926dcd73f5e52f2b5ba4c05ecd5610e57feea41f3367d724d0ec87bc0acd6546066f33b117921b27f5c48b2257794e117a19ffbbb5969834c95f1cab29224b5

Malware Config

Extracted

Family

danabot

C2

51.178.195.151

51.222.39.81

149.255.35.125

38.68.50.179

51.77.7.204

rsa_pubkey.plain

Targets

    • Target

      dc825fb0f3c7fb28693590a4a5c1cc7f.exe

    • Size

      2.7MB

    • MD5

      dc825fb0f3c7fb28693590a4a5c1cc7f

    • SHA1

      6d1a2bf886509558c876c82e94465ce0b1fa0b4d

    • SHA256

      677f90dd4838bff9c07d1f730907777ce27bdf40cca7a7a664cf675cf33b4622

    • SHA512

      4926dcd73f5e52f2b5ba4c05ecd5610e57feea41f3367d724d0ec87bc0acd6546066f33b117921b27f5c48b2257794e117a19ffbbb5969834c95f1cab29224b5

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks