General
-
Target
ab5e684ec147b4984cee1c4fdd7228ebc35ebe00b55cfed6170a9a158da40853
-
Size
1.8MB
-
Sample
211230-an6weaeaam
-
MD5
cd8efee431f89a137c6342618280431f
-
SHA1
d1ab5e7e235361b99c42dddfb4a82d808530197a
-
SHA256
ab5e684ec147b4984cee1c4fdd7228ebc35ebe00b55cfed6170a9a158da40853
-
SHA512
d3caa40e13b029cec3de30ac9814fb376c4fa8e05b3c4ca6533445cdb5e8f8edc500587fd9a6ba4f1860b3a28b05aba70c8361593d579df3c935cb5efea6dcd1
Static task
static1
Malware Config
Extracted
danabot
4
142.11.244.223:443
192.236.194.72:443
-
embedded_hash
0FA95F120D6EB149A5D48E36BC76879D
-
type
loader
Targets
-
-
Target
ab5e684ec147b4984cee1c4fdd7228ebc35ebe00b55cfed6170a9a158da40853
-
Size
1.8MB
-
MD5
cd8efee431f89a137c6342618280431f
-
SHA1
d1ab5e7e235361b99c42dddfb4a82d808530197a
-
SHA256
ab5e684ec147b4984cee1c4fdd7228ebc35ebe00b55cfed6170a9a158da40853
-
SHA512
d3caa40e13b029cec3de30ac9814fb376c4fa8e05b3c4ca6533445cdb5e8f8edc500587fd9a6ba4f1860b3a28b05aba70c8361593d579df3c935cb5efea6dcd1
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Loads dropped DLL
-