General
-
Target
e6a0a80146c25c42b8dda2920b7a405b84572c74
-
Size
1.2MB
-
Sample
220712-amc7psebhl
-
MD5
8cdb5c3a79016ec5c2f3961d14e1ead7
-
SHA1
e6a0a80146c25c42b8dda2920b7a405b84572c74
-
SHA256
5c9ec4451c27e6441b6fec89e2131aae01d4907c9676438c648764e17764b803
-
SHA512
1d214acdfe22a0f96dab8bbba18f10bade4da765f1e9143ae9f7bdb7b0b71a9cd0346f306ed9a33e081653447066b9a9d41c196bbc1d07de6fa362cceda7be12
Static task
static1
Behavioral task
behavioral1
Sample
e6a0a80146c25c42b8dda2920b7a405b84572c74.exe
Resource
win7-20220414-en
Malware Config
Extracted
danabot
4
23.229.29.48:443
5.9.224.204:443
192.210.222.81:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
Targets
-
-
Target
e6a0a80146c25c42b8dda2920b7a405b84572c74
-
Size
1.2MB
-
MD5
8cdb5c3a79016ec5c2f3961d14e1ead7
-
SHA1
e6a0a80146c25c42b8dda2920b7a405b84572c74
-
SHA256
5c9ec4451c27e6441b6fec89e2131aae01d4907c9676438c648764e17764b803
-
SHA512
1d214acdfe22a0f96dab8bbba18f10bade4da765f1e9143ae9f7bdb7b0b71a9cd0346f306ed9a33e081653447066b9a9d41c196bbc1d07de6fa362cceda7be12
-
Danabot Loader Component
-
Blocklisted process makes network request
-
Loads dropped DLL
-