General
-
Target
996-81-0x00000000030A0000-0x0000000003AFD000-memory.dmp
-
Size
10.4MB
-
Sample
220713-t93wesgffk
-
MD5
fdb9e473e53c4a87685c79e25b32d204
-
SHA1
0877433fad372755bacc5574e65d682b570be5e4
-
SHA256
a49cfd03e995deb4705893c331d37acb39b86dc8d2c31d48d5b853aa60308640
-
SHA512
575d5b54e47ccbc577aae050038a4c0a354f56ccc9e3d16631a898e9d68654ae0d3489a62edd2fa1853d943a3932808e86a5941350f96365fbdbb34b5d10d283
Static task
static1
Behavioral task
behavioral1
Sample
996-81-0x00000000030A0000-0x0000000003AFD000-memory.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
996-81-0x00000000030A0000-0x0000000003AFD000-memory.dll
Resource
win10v2004-20220414-en
Malware Config
Extracted
danabot
100.0.0.0:5148
58.50.42.34:13886
26.18.10.2:5662
60.52.44.36:14400
-
embedded_hash
zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz
-
type
loader
Targets
-
-
Target
996-81-0x00000000030A0000-0x0000000003AFD000-memory.dmp
-
Size
10.4MB
-
MD5
fdb9e473e53c4a87685c79e25b32d204
-
SHA1
0877433fad372755bacc5574e65d682b570be5e4
-
SHA256
a49cfd03e995deb4705893c331d37acb39b86dc8d2c31d48d5b853aa60308640
-
SHA512
575d5b54e47ccbc577aae050038a4c0a354f56ccc9e3d16631a898e9d68654ae0d3489a62edd2fa1853d943a3932808e86a5941350f96365fbdbb34b5d10d283
Score1/10 -