General

  • Target

    a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06

  • Size

    2.2MB

  • Sample

    220511-q7rtlahab4

  • MD5

    73c81633573ad5f1d30f16bbace78256

  • SHA1

    075c68a77646235b5e3972207fe8766a13b47f9c

  • SHA256

    a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06

  • SHA512

    0524aa6a83f67d3478ea46cf2d9f27878d1fa0377408eb045c1726c3ade60050e5d37390f8dbad8b898290b6298523681d6d63699116f40bddf1cdb0d6cffd93

Malware Config

Extracted

Family

danabot

C2

89.44.9.132

64.188.23.70

179.43.133.35

45.147.231.218

89.45.4.126

rsa_pubkey.plain

Targets

    • Target

      a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06

    • Size

      2.2MB

    • MD5

      73c81633573ad5f1d30f16bbace78256

    • SHA1

      075c68a77646235b5e3972207fe8766a13b47f9c

    • SHA256

      a856585c094aebd0869ba130ac9a3e5eea6768e2da1086c733abef57c5a4ec06

    • SHA512

      0524aa6a83f67d3478ea46cf2d9f27878d1fa0377408eb045c1726c3ade60050e5d37390f8dbad8b898290b6298523681d6d63699116f40bddf1cdb0d6cffd93

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks