General
-
Target
4744-142-0x0000000000400000-0x0000000002D3B000-memory.dmp
-
Size
41.2MB
-
Sample
221027-pef1yscag4
-
MD5
74974bfb01a79d0c951a14c2d5adeb9b
-
SHA1
a05de4edceff5a93a151a28f84d8b036a36cefa5
-
SHA256
dfb3c880a6aeefc7ac1feb56d661a6b001d5a3bb435d1156679ae284d09cdf48
-
SHA512
61f24b404632a8a0c27bfb89c6229ad75c4ede503d93a5fee25af861cf4c2de02a2086ea190887b2c0e9d3944f2c788c39b53145124ef69338ce33e3d50db59e
-
SSDEEP
49152:vmjEUsHPP/fci9ZJzE5WKQ352Dpm9uTsND5Bi:8EtPsiLVE5WKQ32mhND7i
Behavioral task
behavioral1
Sample
4744-142-0x0000000000400000-0x0000000002D3B000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4744-142-0x0000000000400000-0x0000000002D3B000-memory.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
danabot
-
embedded_hash
BBBB0DB8CB7E6D152424535822E445A7
-
type
loader
Targets
-
-
Target
4744-142-0x0000000000400000-0x0000000002D3B000-memory.dmp
-
Size
41.2MB
-
MD5
74974bfb01a79d0c951a14c2d5adeb9b
-
SHA1
a05de4edceff5a93a151a28f84d8b036a36cefa5
-
SHA256
dfb3c880a6aeefc7ac1feb56d661a6b001d5a3bb435d1156679ae284d09cdf48
-
SHA512
61f24b404632a8a0c27bfb89c6229ad75c4ede503d93a5fee25af861cf4c2de02a2086ea190887b2c0e9d3944f2c788c39b53145124ef69338ce33e3d50db59e
-
SSDEEP
49152:vmjEUsHPP/fci9ZJzE5WKQ352Dpm9uTsND5Bi:8EtPsiLVE5WKQ32mhND7i
Score1/10 -