General
-
Target
fbacaf1c851b857f9bbf548ded4e522874aa063510173b0ae58be94c7ff4e101
-
Size
1.9MB
-
Sample
211230-mjxhdsfgd2
-
MD5
2ae10d755edea1c2cd2213d266026613
-
SHA1
ab62e705161025ed0bf519737704ce58720e45fd
-
SHA256
fbacaf1c851b857f9bbf548ded4e522874aa063510173b0ae58be94c7ff4e101
-
SHA512
ab78860bee7cfaa442b64ba1a7d4b9b4d77a5c74246e940022b625988549c9d3a2a9e4c5afc23ae155468162fc59081d05286d88b316ffbba5a7b70d81edb24d
Static task
static1
Malware Config
Extracted
danabot
4
142.11.244.223:443
192.236.194.72:443
-
embedded_hash
0FA95F120D6EB149A5D48E36BC76879D
-
type
loader
Targets
-
-
Target
fbacaf1c851b857f9bbf548ded4e522874aa063510173b0ae58be94c7ff4e101
-
Size
1.9MB
-
MD5
2ae10d755edea1c2cd2213d266026613
-
SHA1
ab62e705161025ed0bf519737704ce58720e45fd
-
SHA256
fbacaf1c851b857f9bbf548ded4e522874aa063510173b0ae58be94c7ff4e101
-
SHA512
ab78860bee7cfaa442b64ba1a7d4b9b4d77a5c74246e940022b625988549c9d3a2a9e4c5afc23ae155468162fc59081d05286d88b316ffbba5a7b70d81edb24d
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Loads dropped DLL
-