General

  • Target

    099b53db513b96079852a7cd8c29de2188e043e6dd43bbc546ca65b7f190762c

  • Size

    562KB

  • Sample

    220524-dt3mqahcaq

  • MD5

    78aca9a4732d4c547d6bd5c3f3f23dfa

  • SHA1

    d1ce6a48518c2f7b505a90462af916723c0c1bb1

  • SHA256

    099b53db513b96079852a7cd8c29de2188e043e6dd43bbc546ca65b7f190762c

  • SHA512

    e9cd798a5c2eb2863e45d2311cb087c18afefaaadd5cef2894d8f41c3ad280f08abb791c42bba37e816971d07d3207a5eafc0afba71c57465d05645d3e6a855a

Malware Config

Extracted

Family

danabot

C2

5.61.56.192

5.61.58.130

2.56.212.4

32.99.84.84

152.195.32.21

49.126.36.10

93.165.23.189

22.55.172.123

113.104.135.195

2.56.213.39

rsa_pubkey.plain

Targets

    • Target

      099b53db513b96079852a7cd8c29de2188e043e6dd43bbc546ca65b7f190762c

    • Size

      562KB

    • MD5

      78aca9a4732d4c547d6bd5c3f3f23dfa

    • SHA1

      d1ce6a48518c2f7b505a90462af916723c0c1bb1

    • SHA256

      099b53db513b96079852a7cd8c29de2188e043e6dd43bbc546ca65b7f190762c

    • SHA512

      e9cd798a5c2eb2863e45d2311cb087c18afefaaadd5cef2894d8f41c3ad280f08abb791c42bba37e816971d07d3207a5eafc0afba71c57465d05645d3e6a855a

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks