General

  • Target

    f4ece2e087a027df893f9575d2ca71102e96ad1048ce54727cccfff810343b18

  • Size

    1.0MB

  • Sample

    210509-9t4e1n36kn

  • MD5

    60f54b040dacc7d25f7b4f19939669df

  • SHA1

    1220b332ca4bca3255b1511c98a21394996d49ba

  • SHA256

    f4ece2e087a027df893f9575d2ca71102e96ad1048ce54727cccfff810343b18

  • SHA512

    7fdd04fbdc195fff2fcd03d9110803d223c22274e79482f3a2fa54f5c7253b3dc67cc720bde5b1659a569eda6dc08cacf1d3904a91da0f70b5bc4c5f8923f63f

Malware Config

Extracted

Family

danabot

C2

5.61.58.130

2.56.213.39

5.61.56.192

rsa_pubkey.plain

Targets

    • Target

      f4ece2e087a027df893f9575d2ca71102e96ad1048ce54727cccfff810343b18

    • Size

      1.0MB

    • MD5

      60f54b040dacc7d25f7b4f19939669df

    • SHA1

      1220b332ca4bca3255b1511c98a21394996d49ba

    • SHA256

      f4ece2e087a027df893f9575d2ca71102e96ad1048ce54727cccfff810343b18

    • SHA512

      7fdd04fbdc195fff2fcd03d9110803d223c22274e79482f3a2fa54f5c7253b3dc67cc720bde5b1659a569eda6dc08cacf1d3904a91da0f70b5bc4c5f8923f63f

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks