General
-
Target
25f90321fc093db862d969d5b9888f7b0ac5df0ac85734bc9de0b6bad6868737
-
Size
1.8MB
-
Sample
220101-v2qfsshgh8
-
MD5
56dae30240898383e25ccb1d3dbfe4dd
-
SHA1
1e11a302ad061c627137784afda2850ce0a51fe8
-
SHA256
25f90321fc093db862d969d5b9888f7b0ac5df0ac85734bc9de0b6bad6868737
-
SHA512
cba2b63104777ce6e08ca1fcce9146b2f9cc8317095fc66e14dcfc040dcb977ef533f7759159ae3f17991f2de63a3554756303fa5ffad8564a166021ccb9faf6
Static task
static1
Malware Config
Extracted
danabot
4
142.11.244.223:443
192.236.194.72:443
-
embedded_hash
0FA95F120D6EB149A5D48E36BC76879D
-
type
loader
Targets
-
-
Target
25f90321fc093db862d969d5b9888f7b0ac5df0ac85734bc9de0b6bad6868737
-
Size
1.8MB
-
MD5
56dae30240898383e25ccb1d3dbfe4dd
-
SHA1
1e11a302ad061c627137784afda2850ce0a51fe8
-
SHA256
25f90321fc093db862d969d5b9888f7b0ac5df0ac85734bc9de0b6bad6868737
-
SHA512
cba2b63104777ce6e08ca1fcce9146b2f9cc8317095fc66e14dcfc040dcb977ef533f7759159ae3f17991f2de63a3554756303fa5ffad8564a166021ccb9faf6
-
Danabot Loader Component
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Loads dropped DLL
-