General

  • Target

    b02c3131bf5fb12b3fae117632dc86ed.exe

  • Size

    2.6MB

  • Sample

    201109-yep1qqbjls

  • MD5

    b02c3131bf5fb12b3fae117632dc86ed

  • SHA1

    4fcc44307fa4c5826a7d33109917b3cb436722fd

  • SHA256

    9309025b86610fc4dade312f3681fa0e9370dcecca1563393fe4866d4e718d19

  • SHA512

    00c388778f35becdcbf0460b57cc5bedad70cdbf7872e9a3d1ce55d17a5690a3c5374e9610ba1c729e6e1a1574c4cfa27908904c18e3bd77438c78d2371d76dd

Malware Config

Extracted

Family

danabot

C2

45.147.231.202

23.83.133.10

137.74.66.92

185.227.138.52

192.236.146.249

149.255.35.125

rsa_pubkey.plain

Targets

    • Target

      b02c3131bf5fb12b3fae117632dc86ed.exe

    • Size

      2.6MB

    • MD5

      b02c3131bf5fb12b3fae117632dc86ed

    • SHA1

      4fcc44307fa4c5826a7d33109917b3cb436722fd

    • SHA256

      9309025b86610fc4dade312f3681fa0e9370dcecca1563393fe4866d4e718d19

    • SHA512

      00c388778f35becdcbf0460b57cc5bedad70cdbf7872e9a3d1ce55d17a5690a3c5374e9610ba1c729e6e1a1574c4cfa27908904c18e3bd77438c78d2371d76dd

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks