General

  • Target

    6580b317fa344c60c98d15f71a92fd9ca77d7431e4095a73cd8066510d938aeb

  • Size

    1011KB

  • Sample

    210509-qvt3r4q5jj

  • MD5

    e8e4a5dbac5a64dbe4b134ecd5732c4e

  • SHA1

    eaa845953ff0fa95a1901c3630e51cef1c9c3edb

  • SHA256

    6580b317fa344c60c98d15f71a92fd9ca77d7431e4095a73cd8066510d938aeb

  • SHA512

    cbf46029ed65e8dfa9aa2c93b4e8879092dd5bdd02cf467408ce085631ec3d695342765865fb0dd656b2822cb438fe8dc4b7804c6010ad4db9d79e8464326370

Malware Config

Extracted

Family

danabot

C2

5.61.58.130

2.56.213.39

5.61.56.192

rsa_pubkey.plain

Targets

    • Target

      6580b317fa344c60c98d15f71a92fd9ca77d7431e4095a73cd8066510d938aeb

    • Size

      1011KB

    • MD5

      e8e4a5dbac5a64dbe4b134ecd5732c4e

    • SHA1

      eaa845953ff0fa95a1901c3630e51cef1c9c3edb

    • SHA256

      6580b317fa344c60c98d15f71a92fd9ca77d7431e4095a73cd8066510d938aeb

    • SHA512

      cbf46029ed65e8dfa9aa2c93b4e8879092dd5bdd02cf467408ce085631ec3d695342765865fb0dd656b2822cb438fe8dc4b7804c6010ad4db9d79e8464326370

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks