General
-
Target
SecuriteInfo.com.Variant.Danabot.2.16004.30686
-
Size
940KB
-
Sample
201109-qhka94nqqe
-
MD5
9eb0aebd25f98f98e43e3834522c53c9
-
SHA1
64bad90f8b64195814994f92b1e632f5691b8072
-
SHA256
99b57af659b47128ffbae221dd8523c29e2ee7c21da77d5258b8b6c839c1d378
-
SHA512
66b9735e48963d0d1224cc87d74d7ce7f8a73721c04344da69aa389e19918e9a0045fbd6b4b7b366805ba0ebea0a1262890a82917f17a86e1fa9a3d7709769f2
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Variant.Danabot.2.16004.30686.exe
Resource
win7v20201028
Malware Config
Extracted
danabot
54.38.22.65
192.99.219.207
51.255.134.130
192.236.179.73
23.82.140.201
172.81.129.196
Targets
-
-
Target
SecuriteInfo.com.Variant.Danabot.2.16004.30686
-
Size
940KB
-
MD5
9eb0aebd25f98f98e43e3834522c53c9
-
SHA1
64bad90f8b64195814994f92b1e632f5691b8072
-
SHA256
99b57af659b47128ffbae221dd8523c29e2ee7c21da77d5258b8b6c839c1d378
-
SHA512
66b9735e48963d0d1224cc87d74d7ce7f8a73721c04344da69aa389e19918e9a0045fbd6b4b7b366805ba0ebea0a1262890a82917f17a86e1fa9a3d7709769f2
-
Danabot x86 payload
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
-
Blocklisted process makes network request
-
Loads dropped DLL
-