General

  • Target

    2a67f7b5c5a1fae80726c98335f2be0533ab9a10ea6c26615ce67229fd3043bc

  • Size

    1011KB

  • Sample

    210509-7qnavadnsn

  • MD5

    d45768ceae6cfdd8d41904340c72517a

  • SHA1

    12062eca4bb9b412b8af3873d6224f5909153aaf

  • SHA256

    2a67f7b5c5a1fae80726c98335f2be0533ab9a10ea6c26615ce67229fd3043bc

  • SHA512

    d2b91415aa026adebb126612a32cf6318af4289672d848016e19a301e40f8d28eb9dc477762270c098e936f10c2e07b1c31a497aeef5ecad7f338ee2cf1b86b5

Malware Config

Extracted

Family

danabot

C2

5.61.58.130

2.56.213.39

5.61.56.192

rsa_pubkey.plain

Targets

    • Target

      2a67f7b5c5a1fae80726c98335f2be0533ab9a10ea6c26615ce67229fd3043bc

    • Size

      1011KB

    • MD5

      d45768ceae6cfdd8d41904340c72517a

    • SHA1

      12062eca4bb9b412b8af3873d6224f5909153aaf

    • SHA256

      2a67f7b5c5a1fae80726c98335f2be0533ab9a10ea6c26615ce67229fd3043bc

    • SHA512

      d2b91415aa026adebb126612a32cf6318af4289672d848016e19a301e40f8d28eb9dc477762270c098e936f10c2e07b1c31a497aeef5ecad7f338ee2cf1b86b5

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks