General

  • Target

    7a65d8d9f2db84625e49aa0b40f4c342f2835577ccce279e57d381777ecc7857

  • Size

    2.3MB

  • Sample

    220625-mmgw4sagh6

  • MD5

    832c084cd464448ac0b2d49c1adecb77

  • SHA1

    806a3b179a807bf7ad879a2e9029b360086832f3

  • SHA256

    7a65d8d9f2db84625e49aa0b40f4c342f2835577ccce279e57d381777ecc7857

  • SHA512

    aed0d6106f72ded4ae4cc4afc50c1ad1a890cd33c3c6fa71cae7a0a01b5f5c22fcb5198ba45e2dc372ffdd5cdf3a5c97ee001029b67bebf26fa8cf99702af175

Malware Config

Extracted

Family

danabot

C2

236.34.98.36

184.82.0.199

99.142.111.190

11.202.75.114

98.208.224.126

191.90.126.19

20.31.15.28

195.123.220.45

149.154.159.213

248.83.33.201

rsa_pubkey.plain

Targets

    • Target

      7a65d8d9f2db84625e49aa0b40f4c342f2835577ccce279e57d381777ecc7857

    • Size

      2.3MB

    • MD5

      832c084cd464448ac0b2d49c1adecb77

    • SHA1

      806a3b179a807bf7ad879a2e9029b360086832f3

    • SHA256

      7a65d8d9f2db84625e49aa0b40f4c342f2835577ccce279e57d381777ecc7857

    • SHA512

      aed0d6106f72ded4ae4cc4afc50c1ad1a890cd33c3c6fa71cae7a0a01b5f5c22fcb5198ba45e2dc372ffdd5cdf3a5c97ee001029b67bebf26fa8cf99702af175

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks