General

  • Target

    40a498c4ed3c62f7b42141338c5ac7755d12a0650a49832f2f9b4c57bf47c7c7

  • Size

    2.4MB

  • Sample

    220508-gm1rbsgfh8

  • MD5

    8bb98c6ebdc6c94ee1d4bda43c027591

  • SHA1

    457da876e3c9d70c1588c6d3717da6ec9288dd91

  • SHA256

    40a498c4ed3c62f7b42141338c5ac7755d12a0650a49832f2f9b4c57bf47c7c7

  • SHA512

    44bfcc279b76972e17f5decf0fbce8cf18686aaae31eba36c296f0c0ca5fbc2c8974e22c219951cd98b0ad8a21635694344370ed8b7bf173859f71d9ba50a24a

Malware Config

Extracted

Family

danabot

C2

89.44.9.132

64.188.23.70

179.43.133.35

45.147.231.218

89.45.4.126

rsa_pubkey.plain

Targets

    • Target

      40a498c4ed3c62f7b42141338c5ac7755d12a0650a49832f2f9b4c57bf47c7c7

    • Size

      2.4MB

    • MD5

      8bb98c6ebdc6c94ee1d4bda43c027591

    • SHA1

      457da876e3c9d70c1588c6d3717da6ec9288dd91

    • SHA256

      40a498c4ed3c62f7b42141338c5ac7755d12a0650a49832f2f9b4c57bf47c7c7

    • SHA512

      44bfcc279b76972e17f5decf0fbce8cf18686aaae31eba36c296f0c0ca5fbc2c8974e22c219951cd98b0ad8a21635694344370ed8b7bf173859f71d9ba50a24a

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks