General
-
Target
c71d528373aadc3115439a24f0b87acecedaef6fe20a99042ff1f93c2ba04ae5
-
Size
1.8MB
-
Sample
211227-vqc2bsbebp
-
MD5
a87010eb1a21c769671bdd342b6f5bf2
-
SHA1
f4551c705f955acbe08f03fdfd0b11c418749102
-
SHA256
c71d528373aadc3115439a24f0b87acecedaef6fe20a99042ff1f93c2ba04ae5
-
SHA512
92abc67c2acd8889a00c226c9cee9c97b047b86fd894126df67fbfd98a292ea562d0863cebc6eaa6a26006a4121023c24f5ca2a237d013fd9fdc7291e7dfea35
Static task
static1
Malware Config
Extracted
danabot
4
142.11.244.223:443
192.236.194.72:443
-
embedded_hash
0FA95F120D6EB149A5D48E36BC76879D
-
type
loader
Targets
-
-
Target
c71d528373aadc3115439a24f0b87acecedaef6fe20a99042ff1f93c2ba04ae5
-
Size
1.8MB
-
MD5
a87010eb1a21c769671bdd342b6f5bf2
-
SHA1
f4551c705f955acbe08f03fdfd0b11c418749102
-
SHA256
c71d528373aadc3115439a24f0b87acecedaef6fe20a99042ff1f93c2ba04ae5
-
SHA512
92abc67c2acd8889a00c226c9cee9c97b047b86fd894126df67fbfd98a292ea562d0863cebc6eaa6a26006a4121023c24f5ca2a237d013fd9fdc7291e7dfea35
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Loads dropped DLL
-