General

  • Target

    655e7140f2e5ba4dcf86f2cb65b8b9e3121699b71faced082951ba7201dc7c95

  • Size

    2.4MB

  • Sample

    220511-q7se5abfhl

  • MD5

    7bf1cdfa96ca67a1440be27539ba927e

  • SHA1

    2978c8f7bca0e489dd49f54d6c8cb48b58620a4a

  • SHA256

    655e7140f2e5ba4dcf86f2cb65b8b9e3121699b71faced082951ba7201dc7c95

  • SHA512

    02e39752167110b4ce8055e09562afed7560b5d3b15ca67f07e953f62c11c672b81b5cf451d017c9f6f9d029c53bc7e92561ec0fcabd0a03c3ae0d126cb93c08

Malware Config

Extracted

Family

danabot

C2

89.44.9.132

64.188.23.70

179.43.133.35

45.147.231.218

89.45.4.126

rsa_pubkey.plain

Targets

    • Target

      655e7140f2e5ba4dcf86f2cb65b8b9e3121699b71faced082951ba7201dc7c95

    • Size

      2.4MB

    • MD5

      7bf1cdfa96ca67a1440be27539ba927e

    • SHA1

      2978c8f7bca0e489dd49f54d6c8cb48b58620a4a

    • SHA256

      655e7140f2e5ba4dcf86f2cb65b8b9e3121699b71faced082951ba7201dc7c95

    • SHA512

      02e39752167110b4ce8055e09562afed7560b5d3b15ca67f07e953f62c11c672b81b5cf451d017c9f6f9d029c53bc7e92561ec0fcabd0a03c3ae0d126cb93c08

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks