General
-
Target
3e2e7ade6f01cbff7cd4cb3380ba211a4646d3e82d295037eb4bb5f85b4835f0
-
Size
1.8MB
-
Sample
211123-kvfb5scgc8
-
MD5
eccbe02e557ad19e5445a9f1523f1c3d
-
SHA1
675d681f5da40f365ce2b3e8f55ed259a40a1fdd
-
SHA256
3e2e7ade6f01cbff7cd4cb3380ba211a4646d3e82d295037eb4bb5f85b4835f0
-
SHA512
8cbd6e5884ceb900c2755991fd145a5ce9af5ec012c1bff5a057e889b544e83aa55322ca444c36129a7e452dce364999a34828b63601564a89d3e19767affdbd
Static task
static1
Malware Config
Extracted
danabot
142.11.244.223:443
23.106.122.139:443
-
embedded_hash
0FA95F120D6EB149A5D48E36BC76879D
-
type
loader
Targets
-
-
Target
3e2e7ade6f01cbff7cd4cb3380ba211a4646d3e82d295037eb4bb5f85b4835f0
-
Size
1.8MB
-
MD5
eccbe02e557ad19e5445a9f1523f1c3d
-
SHA1
675d681f5da40f365ce2b3e8f55ed259a40a1fdd
-
SHA256
3e2e7ade6f01cbff7cd4cb3380ba211a4646d3e82d295037eb4bb5f85b4835f0
-
SHA512
8cbd6e5884ceb900c2755991fd145a5ce9af5ec012c1bff5a057e889b544e83aa55322ca444c36129a7e452dce364999a34828b63601564a89d3e19767affdbd
-
Danabot Loader Component
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Loads dropped DLL
-