fca6217cf8955755dadcff890704ac98883879c24da212b9ef3aaed402e1566e
fca6217cf8955755dadcff890704ac98883879c24da212b9ef3aaed402e1566e.exe
1MB
13-01-2022 13:33
a5fb0a37f7ac9d8efe9c6dc4b5075777
00a4ce2ac284e2cebf56d60398868435fb560cbd
fca6217cf8955755dadcff890704ac98883879c24da212b9ef3aaed402e1566e
Extracted
Family | danabot |
Botnet | 4 |
C2 |
103.175.16.113:443 103.175.16.114:443 |
Attributes |
embedded_hash 422236FD601D11EE82825A484D26DD6F
type loader |
rsa_pubkey.plain |
|
rsa_privkey.plain |
|
Filter: none
-
Danabot
Description
Danabot is a modular banking Trojan that has been linked with other malware.
Tags
-
Danabot Loader Component
Reported IOCs
resource yara_rule behavioral1/files/0x000600000001ab1b-119.dat DanabotLoader2021 behavioral1/files/0x000600000001ab1b-121.dat DanabotLoader2021 behavioral1/files/0x000600000001ab1b-120.dat DanabotLoader2021 behavioral1/memory/1000-122-0x0000000000920000-0x0000000000A71000-memory.dmp DanabotLoader2021 -
Loads dropped DLLrundll32.exe
Reported IOCs
pid process 1000 rundll32.exe 1000 rundll32.exe -
Suspicious use of WriteProcessMemoryfca6217cf8955755dadcff890704ac98883879c24da212b9ef3aaed402e1566e.exe
Reported IOCs
description pid process target process PID 2444 wrote to memory of 1000 2444 fca6217cf8955755dadcff890704ac98883879c24da212b9ef3aaed402e1566e.exe rundll32.exe PID 2444 wrote to memory of 1000 2444 fca6217cf8955755dadcff890704ac98883879c24da212b9ef3aaed402e1566e.exe rundll32.exe PID 2444 wrote to memory of 1000 2444 fca6217cf8955755dadcff890704ac98883879c24da212b9ef3aaed402e1566e.exe rundll32.exe
-
C:\Users\Admin\AppData\Local\Temp\fca6217cf8955755dadcff890704ac98883879c24da212b9ef3aaed402e1566e.exe"C:\Users\Admin\AppData\Local\Temp\fca6217cf8955755dadcff890704ac98883879c24da212b9ef3aaed402e1566e.exe"Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\fca6217cf8955755dadcff890704ac98883879c24da212b9ef3aaed402e1566e.exe.dll,z C:\Users\Admin\AppData\Local\Temp\fca6217cf8955755dadcff890704ac98883879c24da212b9ef3aaed402e1566e.exeLoads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\fca6217cf8955755dadcff890704ac98883879c24da212b9ef3aaed402e1566e.exe.dll
MD5191c50d283bf7567c9f6f6991d16161d
SHA1b396ef81fd678f5bc45970a8172174753ad95aaf
SHA256a32f46e723b14dcb8a7f19d09845dc36c62836f87f0422efd340d011dfe07020
SHA5122d5961168f532d031e199048823500ad37c2766d2ab19f04774384f262f346588693be54e10fd6482d67987f4ff7a00499a31f511faaffac1ba2f863df48da0d
-
\Users\Admin\AppData\Local\Temp\fca6217cf8955755dadcff890704ac98883879c24da212b9ef3aaed402e1566e.exe.dll
MD5191c50d283bf7567c9f6f6991d16161d
SHA1b396ef81fd678f5bc45970a8172174753ad95aaf
SHA256a32f46e723b14dcb8a7f19d09845dc36c62836f87f0422efd340d011dfe07020
SHA5122d5961168f532d031e199048823500ad37c2766d2ab19f04774384f262f346588693be54e10fd6482d67987f4ff7a00499a31f511faaffac1ba2f863df48da0d
-
\Users\Admin\AppData\Local\Temp\fca6217cf8955755dadcff890704ac98883879c24da212b9ef3aaed402e1566e.exe.dll
MD5191c50d283bf7567c9f6f6991d16161d
SHA1b396ef81fd678f5bc45970a8172174753ad95aaf
SHA256a32f46e723b14dcb8a7f19d09845dc36c62836f87f0422efd340d011dfe07020
SHA5122d5961168f532d031e199048823500ad37c2766d2ab19f04774384f262f346588693be54e10fd6482d67987f4ff7a00499a31f511faaffac1ba2f863df48da0d
-
memory/1000-122-0x0000000000920000-0x0000000000A71000-memory.dmp
-
memory/1000-118-0x0000000000000000-mapping.dmp
-
memory/2444-117-0x0000000000400000-0x0000000000529000-memory.dmp
-
memory/2444-115-0x0000000000960000-0x0000000000A45000-memory.dmp
-
memory/2444-116-0x0000000000A50000-0x0000000000B4D000-memory.dmp