General

  • Target

    1502f73d89c9e0e0fbede3da1eb85a065e1954e2b3095c768cfb189e85df3ec5

  • Size

    642KB

  • MD5

    9260c247e415b9120e17ac270d5f4f79

  • SHA1

    6b7ade23f53d64be0a13d843449c3ea62d65d83b

  • SHA256

    1502f73d89c9e0e0fbede3da1eb85a065e1954e2b3095c768cfb189e85df3ec5

  • SHA512

    678a8f39370199d18ab6d3a04e347e4c90650e786f3670515d116ccff61f111690be978d3e7cecb4406df377507f98444a710c981b89de6a558f7e6101f4f3b3

  • SSDEEP

    6144:qbM9Zh15R3N7W/275tyLk4OON09YHLBT+ED4vndXXr32WiRq:qb6v3N7W/2Tyo5Yrt+EAndXXrmW

Score
10/10

Malware Config

Extracted

Family

danabot

C2

110.26.68.209

16.78.162.184

94.10.25.120

185.82.178.8

21.221.79.29

149.154.159.213

137.20.10.198

48.204.112.181

151.236.14.84

224.150.141.17

rsa_pubkey.plain

Signatures

  • Danabot family
  • Danabot x86 payload 1 IoCs

    Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

Files

  • 1502f73d89c9e0e0fbede3da1eb85a065e1954e2b3095c768cfb189e85df3ec5
    .dll windows x86

    59b7410f7c6e09a3d83ed47c8d86f233


    Headers

    Imports

    Exports

    Sections