General
-
Target
44.dll
-
Size
1.3MB
-
Sample
220412-py23jabdfp
-
MD5
448e479874a145608483ddeba7d1d06d
-
SHA1
8cfc0ad5458037c393cdba199d243b0f16c8c7bd
-
SHA256
c486771dcbb6548bbec5bfaf8de3bc0b8e3d8ddf6aa2cd5a0bd0bd4c638839c5
-
SHA512
0631ccdded071dfe011a3b41af55ecd5853edbe171baed4ced28c497753bb69173a37ebfd50506ad1a41cb6c398cdafee5e8b61b25544b9360856353477c89c3
Behavioral task
behavioral1
Sample
44.dll
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
44.dll
Resource
win10v2004-20220331-en
Malware Config
Extracted
danabot
4
5.9.224.204:443
192.210.222.81:443
23.229.29.48:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
Targets
-
-
Target
44.dll
-
Size
1.3MB
-
MD5
448e479874a145608483ddeba7d1d06d
-
SHA1
8cfc0ad5458037c393cdba199d243b0f16c8c7bd
-
SHA256
c486771dcbb6548bbec5bfaf8de3bc0b8e3d8ddf6aa2cd5a0bd0bd4c638839c5
-
SHA512
0631ccdded071dfe011a3b41af55ecd5853edbe171baed4ced28c497753bb69173a37ebfd50506ad1a41cb6c398cdafee5e8b61b25544b9360856353477c89c3
-
Danabot Loader Component
-
Blocklisted process makes network request
-