General

  • Target

    siri_ip_only

  • Size

    2.6MB

  • Sample

    201116-j124hm3jmj

  • MD5

    03e0c74254b2e66f3c806fb9e6d72e8b

  • SHA1

    ca3aa0febbc6e19df2e269f56ddbfe69f3f1edaf

  • SHA256

    219ce23454e6209702f4795e16765681936d2e4e4166c601a2ac412b15f4c1a5

  • SHA512

    b1e6f199c86a2a4809a7305fab01652090e99684a4a5c8c58a9b5524c338966caba609c9fad5fe163b14e59476d575c2bb5b5700f1cd6e480316194fb403ad19

Malware Config

Extracted

Family

danabot

C2

37.120.145.180

95.174.65.203

51.77.7.204

192.236.160.191

193.34.167.174

185.227.138.47

rsa_pubkey.plain

Targets

    • Target

      siri_ip_only

    • Size

      2.6MB

    • MD5

      03e0c74254b2e66f3c806fb9e6d72e8b

    • SHA1

      ca3aa0febbc6e19df2e269f56ddbfe69f3f1edaf

    • SHA256

      219ce23454e6209702f4795e16765681936d2e4e4166c601a2ac412b15f4c1a5

    • SHA512

      b1e6f199c86a2a4809a7305fab01652090e99684a4a5c8c58a9b5524c338966caba609c9fad5fe163b14e59476d575c2bb5b5700f1cd6e480316194fb403ad19

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks