General

  • Target

    b35d2d3795d54078fe40169c7bdc902a7eaa6cf6c7c10abe34bf6da36f7fe399

  • Size

    2.6MB

  • Sample

    220524-vgz5haeadl

  • MD5

    fc43f8c0ee91e1b56d60c6a7bacdb80f

  • SHA1

    fede90bc7e2a70acf9f86a2c8b0ca92bc285ebba

  • SHA256

    b35d2d3795d54078fe40169c7bdc902a7eaa6cf6c7c10abe34bf6da36f7fe399

  • SHA512

    a84b9dc9f445f88e8501cace5105b4f049f502acf17a1b1b6605205d7bce295666cd43fe743a6af5d4493d899a97bf81dfca689b6a1eb3997687c08f04e30eb8

Malware Config

Extracted

Family

danabot

C2

137.74.66.92

185.227.138.52

192.236.146.249

172.93.201.168

193.34.166.244

23.83.133.10

rsa_pubkey.plain

Targets

    • Target

      b35d2d3795d54078fe40169c7bdc902a7eaa6cf6c7c10abe34bf6da36f7fe399

    • Size

      2.6MB

    • MD5

      fc43f8c0ee91e1b56d60c6a7bacdb80f

    • SHA1

      fede90bc7e2a70acf9f86a2c8b0ca92bc285ebba

    • SHA256

      b35d2d3795d54078fe40169c7bdc902a7eaa6cf6c7c10abe34bf6da36f7fe399

    • SHA512

      a84b9dc9f445f88e8501cace5105b4f049f502acf17a1b1b6605205d7bce295666cd43fe743a6af5d4493d899a97bf81dfca689b6a1eb3997687c08f04e30eb8

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks