General
-
Target
614593ae07e9dc823823a9dc743b28bc1e49d7d7733f5eff9d9ec762b1f3e5b5
-
Size
1.8MB
-
Sample
220101-v3x72agcfk
-
MD5
63d687e9035dfc490c4902df28b680d6
-
SHA1
01bf1412e051644f2001eb4a619d618cb9a19690
-
SHA256
614593ae07e9dc823823a9dc743b28bc1e49d7d7733f5eff9d9ec762b1f3e5b5
-
SHA512
eed11dacf77308616c5d9c542ef5e6cf97ff0366eea594d8084ca1593c452388a3b16d55e74eb850161364794e02a4987cdf2af1845434a9875258c52da31121
Static task
static1
Malware Config
Extracted
danabot
4
142.11.244.223:443
192.236.194.72:443
-
embedded_hash
0FA95F120D6EB149A5D48E36BC76879D
-
type
loader
Targets
-
-
Target
614593ae07e9dc823823a9dc743b28bc1e49d7d7733f5eff9d9ec762b1f3e5b5
-
Size
1.8MB
-
MD5
63d687e9035dfc490c4902df28b680d6
-
SHA1
01bf1412e051644f2001eb4a619d618cb9a19690
-
SHA256
614593ae07e9dc823823a9dc743b28bc1e49d7d7733f5eff9d9ec762b1f3e5b5
-
SHA512
eed11dacf77308616c5d9c542ef5e6cf97ff0366eea594d8084ca1593c452388a3b16d55e74eb850161364794e02a4987cdf2af1845434a9875258c52da31121
-
Danabot Loader Component
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Loads dropped DLL
-