General

  • Target

    388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03

  • Size

    1.0MB

  • Sample

    220625-yfq2zshfcm

  • MD5

    fee86ee228084c3126a596d9f375f960

  • SHA1

    9ef35a4fd88dcf47fcfdad492543c908b320a511

  • SHA256

    388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03

  • SHA512

    123ebbf1cc27ea7e042c1ed5f5c7dcb85f47d7f543cbca0953e84d6318159d0262d21ab2b48e8eb68c7dbc1d62f996ef77cda9c5673cb3a7ec5690169a0c569c

Malware Config

Extracted

Family

danabot

C2

5.61.58.130

2.56.213.39

2.56.212.4

5.61.56.192

rsa_pubkey.plain

Targets

    • Target

      388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03

    • Size

      1.0MB

    • MD5

      fee86ee228084c3126a596d9f375f960

    • SHA1

      9ef35a4fd88dcf47fcfdad492543c908b320a511

    • SHA256

      388b0f12f5a0c50c6e3382d0293a6caaf19e498cf57e6f5312e410a723926b03

    • SHA512

      123ebbf1cc27ea7e042c1ed5f5c7dcb85f47d7f543cbca0953e84d6318159d0262d21ab2b48e8eb68c7dbc1d62f996ef77cda9c5673cb3a7ec5690169a0c569c

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot x86 payload

      Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Matrix

Tasks