General
-
Target
388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03
-
Size
1.0MB
-
Sample
220625-yfq2zshfcm
-
MD5
fee86ee228084c3126a596d9f375f960
-
SHA1
9ef35a4fd88dcf47fcfdad492543c908b320a511
-
SHA256
388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03
-
SHA512
123ebbf1cc27ea7e042c1ed5f5c7dcb85f47d7f543cbca0953e84d6318159d0262d21ab2b48e8eb68c7dbc1d62f996ef77cda9c5673cb3a7ec5690169a0c569c
Static task
static1
Behavioral task
behavioral1
Sample
388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03.exe
Resource
win7-20220414-en
Malware Config
Extracted
danabot
5.61.58.130
2.56.213.39
2.56.212.4
5.61.56.192
Targets
-
-
Target
388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03
-
Size
1.0MB
-
MD5
fee86ee228084c3126a596d9f375f960
-
SHA1
9ef35a4fd88dcf47fcfdad492543c908b320a511
-
SHA256
388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03
-
SHA512
123ebbf1cc27ea7e042c1ed5f5c7dcb85f47d7f543cbca0953e84d6318159d0262d21ab2b48e8eb68c7dbc1d62f996ef77cda9c5673cb3a7ec5690169a0c569c
-
Danabot x86 payload
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
-
Blocklisted process makes network request
-
Loads dropped DLL
-