General
-
Target
059ecd44a0a8e698d068af0113a959d4.dll
-
Size
1.3MB
-
Sample
220413-yr36paffgl
-
MD5
059ecd44a0a8e698d068af0113a959d4
-
SHA1
5229e8e75330aa5757f4591dc05066fa83260524
-
SHA256
015ae95e7a2e982f1bc053d1a0c9d10fa47519daf13aceb97431025e2de69088
-
SHA512
b952234342438e56106226b9e8340c3cc6e65d492fca7cc874f291ade3521ab00531b64d9984e49ad6449e9a51731bcae4eeb2da2da794d48266da8c61314137
Behavioral task
behavioral1
Sample
059ecd44a0a8e698d068af0113a959d4.dll
Resource
win7-20220310-en
Malware Config
Extracted
danabot
4
104.168.148.6:443
5.9.224.204:443
192.210.222.81:443
23.229.29.48:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
Targets
-
-
Target
059ecd44a0a8e698d068af0113a959d4.dll
-
Size
1.3MB
-
MD5
059ecd44a0a8e698d068af0113a959d4
-
SHA1
5229e8e75330aa5757f4591dc05066fa83260524
-
SHA256
015ae95e7a2e982f1bc053d1a0c9d10fa47519daf13aceb97431025e2de69088
-
SHA512
b952234342438e56106226b9e8340c3cc6e65d492fca7cc874f291ade3521ab00531b64d9984e49ad6449e9a51731bcae4eeb2da2da794d48266da8c61314137
-
suricata: ET MALWARE Danabot Key Exchange Request
suricata: ET MALWARE Danabot Key Exchange Request
-
Blocklisted process makes network request
-