General
-
Target
1608-59-0x00000000029D0000-0x000000000343B000-memory.dmp
-
Size
10.4MB
-
Sample
220709-jsw2fafeh7
-
MD5
aa7675bf127b6c4667c2977a68d6ae95
-
SHA1
35da199e81fe5f4f5e670149fd83c8377d03875c
-
SHA256
86da0b2e508c30279454485b4591b074d3c2ea9514f8f9bcc3638f7ec1bfef2a
-
SHA512
91ae06783f351ad59639a44923747400614bb36fab27e973bbcb4d9f8bcf7d56c4edac77dbeefdd6254c10397313fef7264f84f47d2ab3eb108a6ed406faaf42
Static task
static1
Behavioral task
behavioral1
Sample
1608-59-0x00000000029D0000-0x000000000343B000-memory.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1608-59-0x00000000029D0000-0x000000000343B000-memory.dll
Resource
win10v2004-20220414-en
Malware Config
Extracted
danabot
100.0.0.0:5148
58.50.42.34:13886
26.18.10.2:5662
60.52.44.36:14400
-
embedded_hash
zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz
-
type
loader
Targets
-
-
Target
1608-59-0x00000000029D0000-0x000000000343B000-memory.dmp
-
Size
10.4MB
-
MD5
aa7675bf127b6c4667c2977a68d6ae95
-
SHA1
35da199e81fe5f4f5e670149fd83c8377d03875c
-
SHA256
86da0b2e508c30279454485b4591b074d3c2ea9514f8f9bcc3638f7ec1bfef2a
-
SHA512
91ae06783f351ad59639a44923747400614bb36fab27e973bbcb4d9f8bcf7d56c4edac77dbeefdd6254c10397313fef7264f84f47d2ab3eb108a6ed406faaf42
Score1/10 -