General

  • Target

    76d9f06d6861a5fa03c02ca11c643684f51ba3372666b2f1541578f09c1d6d85

  • Size

    2.3MB

  • Sample

    220516-twqnyaaed6

  • MD5

    5c7d93ea976f1f84ac8bef6e6065deca

  • SHA1

    22f9a5f7e38ac207f21287fa63f371a255a68c83

  • SHA256

    76d9f06d6861a5fa03c02ca11c643684f51ba3372666b2f1541578f09c1d6d85

  • SHA512

    0a64b6d8a6c87e0ea11c56b3542b229e97a4ffa6450a26456faa1b025a7ef5164f1b21bfceab04e5e480f893657c2bd65d6e1b6180f12b123783e1b19e0727b7

Malware Config

Extracted

Family

danabot

C2

89.44.9.132

64.188.23.70

179.43.133.35

45.147.231.218

89.45.4.126

rsa_pubkey.plain

Targets

    • Target

      76d9f06d6861a5fa03c02ca11c643684f51ba3372666b2f1541578f09c1d6d85

    • Size

      2.3MB

    • MD5

      5c7d93ea976f1f84ac8bef6e6065deca

    • SHA1

      22f9a5f7e38ac207f21287fa63f371a255a68c83

    • SHA256

      76d9f06d6861a5fa03c02ca11c643684f51ba3372666b2f1541578f09c1d6d85

    • SHA512

      0a64b6d8a6c87e0ea11c56b3542b229e97a4ffa6450a26456faa1b025a7ef5164f1b21bfceab04e5e480f893657c2bd65d6e1b6180f12b123783e1b19e0727b7

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks