General

  • Target

    ba3841c1862701e19b3b6494adc463d7bc6a2c0c939b207794db38fd9ddc11dc

  • Size

    2.7MB

  • Sample

    220524-s7g1hacbar

  • MD5

    645f3743845dad68e2f3101a2fded180

  • SHA1

    a0793a16897f0638fc5d3d850969b4c0da34737c

  • SHA256

    ba3841c1862701e19b3b6494adc463d7bc6a2c0c939b207794db38fd9ddc11dc

  • SHA512

    a77fbd30365af7016d406572921cfccba076b8f883cc04da1242ad52646c9319b4d46b7a18aeb53921bc1f740120ffc752c467a9b9cac3844f76306abe76edb8

Malware Config

Extracted

Family

danabot

C2

51.178.195.151

51.222.39.81

149.255.35.125

38.68.50.179

51.77.7.204

rsa_pubkey.plain

Targets

    • Target

      ba3841c1862701e19b3b6494adc463d7bc6a2c0c939b207794db38fd9ddc11dc

    • Size

      2.7MB

    • MD5

      645f3743845dad68e2f3101a2fded180

    • SHA1

      a0793a16897f0638fc5d3d850969b4c0da34737c

    • SHA256

      ba3841c1862701e19b3b6494adc463d7bc6a2c0c939b207794db38fd9ddc11dc

    • SHA512

      a77fbd30365af7016d406572921cfccba076b8f883cc04da1242ad52646c9319b4d46b7a18aeb53921bc1f740120ffc752c467a9b9cac3844f76306abe76edb8

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks