General
-
Target
0d1e6c5149c24875dd99e957d9207794
-
Size
1.3MB
-
Sample
231221-1zakfsbdem
-
MD5
0d1e6c5149c24875dd99e957d9207794
-
SHA1
81af6ac564bd13f82560c03563a965320b91d568
-
SHA256
247c740bf91c64bab302c0b53a1e138ebe6f951dac9c28c0be34c77ff1d35eba
-
SHA512
5b97c5db16b60cadacb02119d324fe87b71bdf165430e09283177624d4cc50fdf376d9cbe55271a2640a6d17164d760f9de076573dd0755a3f0e3e07fa994b13
-
SSDEEP
24576:hcF2ZBcDOPZA9N26e8nJZBAWOqlSKT9T3df:CYCRZBHNSCTB
Behavioral task
behavioral1
Sample
0d1e6c5149c24875dd99e957d9207794.dll
Resource
win7-20231215-en
Malware Config
Extracted
danabot
5
192.210.222.81:443
23.229.29.48:443
5.9.224.204:443
192.255.166.212:443
-
embedded_hash
100700D372965A717E89B8C909E1D8D4
-
type
loader
Targets
-
-
Target
0d1e6c5149c24875dd99e957d9207794
-
Size
1.3MB
-
MD5
0d1e6c5149c24875dd99e957d9207794
-
SHA1
81af6ac564bd13f82560c03563a965320b91d568
-
SHA256
247c740bf91c64bab302c0b53a1e138ebe6f951dac9c28c0be34c77ff1d35eba
-
SHA512
5b97c5db16b60cadacb02119d324fe87b71bdf165430e09283177624d4cc50fdf376d9cbe55271a2640a6d17164d760f9de076573dd0755a3f0e3e07fa994b13
-
SSDEEP
24576:hcF2ZBcDOPZA9N26e8nJZBAWOqlSKT9T3df:CYCRZBHNSCTB
-
Danabot Loader Component
-
Blocklisted process makes network request
-