General
-
Target
b324872cf2361acfa11bb5127b260ae226117150ad9d03e481ed08c17f6ca5c2
-
Size
1.8MB
-
Sample
211118-yycmbaaea8
-
MD5
b9c577e188a9123ce81a75b1a88123a1
-
SHA1
dc4f1e4b46bec55ea693d904480708d0518005c0
-
SHA256
b324872cf2361acfa11bb5127b260ae226117150ad9d03e481ed08c17f6ca5c2
-
SHA512
e60bbc5ee432f1b3548101937664113b75ad75bdd1ca0539672db71cf1169ec7410b9f75f57d248bce5f4b37c6c8905b40495b2bcb94599979747dca3eae964b
Static task
static1
Malware Config
Extracted
danabot
192.119.110.73:443
192.236.192.201:443
-
embedded_hash
0FA95F120D6EB149A5D48E36BC76879D
-
type
loader
Targets
-
-
Target
b324872cf2361acfa11bb5127b260ae226117150ad9d03e481ed08c17f6ca5c2
-
Size
1.8MB
-
MD5
b9c577e188a9123ce81a75b1a88123a1
-
SHA1
dc4f1e4b46bec55ea693d904480708d0518005c0
-
SHA256
b324872cf2361acfa11bb5127b260ae226117150ad9d03e481ed08c17f6ca5c2
-
SHA512
e60bbc5ee432f1b3548101937664113b75ad75bdd1ca0539672db71cf1169ec7410b9f75f57d248bce5f4b37c6c8905b40495b2bcb94599979747dca3eae964b
-
Danabot Loader Component
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Loads dropped DLL
-