General
-
Target
7ff98ad1098f15b36172887d410f1b732da3d03f9604e6c186869d191fa47dac
-
Size
1.8MB
-
Sample
211231-xmp8lahbe2
-
MD5
2359d1d4b8614b0178579dbfa91033f3
-
SHA1
ea737c837c81aaed8ad3b220e22cd632d83986db
-
SHA256
7ff98ad1098f15b36172887d410f1b732da3d03f9604e6c186869d191fa47dac
-
SHA512
ee7077606b365f1f840f5da5030c9251208f3790ad114451542cfbae89444609dbc4affe2d524b64a7223fbdca364cad49f14614799cc4fcb158be7a14ebd755
Static task
static1
Malware Config
Extracted
danabot
4
142.11.244.223:443
192.236.194.72:443
-
embedded_hash
0FA95F120D6EB149A5D48E36BC76879D
-
type
loader
Targets
-
-
Target
7ff98ad1098f15b36172887d410f1b732da3d03f9604e6c186869d191fa47dac
-
Size
1.8MB
-
MD5
2359d1d4b8614b0178579dbfa91033f3
-
SHA1
ea737c837c81aaed8ad3b220e22cd632d83986db
-
SHA256
7ff98ad1098f15b36172887d410f1b732da3d03f9604e6c186869d191fa47dac
-
SHA512
ee7077606b365f1f840f5da5030c9251208f3790ad114451542cfbae89444609dbc4affe2d524b64a7223fbdca364cad49f14614799cc4fcb158be7a14ebd755
-
Danabot Loader Component
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Loads dropped DLL
-