General
-
Target
d6d68d14cb61bfc2162cbdc601bf4613
-
Size
1.3MB
-
Sample
231222-spms2aagd2
-
MD5
d6d68d14cb61bfc2162cbdc601bf4613
-
SHA1
68e568ceafd17181a827b436745d6ebececec4fb
-
SHA256
c2d00994fd70d61c30f8f420ed99c6066b01ae033d17cec676fc8c0efdb63f3d
-
SHA512
6848141ea4b818540704154967971a502ce24c749b7b085418865846f829403f2d9e54c9a380a4c64cd68275fe2d614cfc252a79360680efb8d03bcd3e0767cc
-
SSDEEP
24576:Z8FG0TfXWkUIxxxR8gOaoMze817T1Gr80:6XXWAR7OcTg
Behavioral task
behavioral1
Sample
d6d68d14cb61bfc2162cbdc601bf4613.dll
Resource
win7-20231215-en
Malware Config
Extracted
danabot
4
23.229.29.48:443
5.9.224.204:443
192.210.222.81:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
Targets
-
-
Target
d6d68d14cb61bfc2162cbdc601bf4613
-
Size
1.3MB
-
MD5
d6d68d14cb61bfc2162cbdc601bf4613
-
SHA1
68e568ceafd17181a827b436745d6ebececec4fb
-
SHA256
c2d00994fd70d61c30f8f420ed99c6066b01ae033d17cec676fc8c0efdb63f3d
-
SHA512
6848141ea4b818540704154967971a502ce24c749b7b085418865846f829403f2d9e54c9a380a4c64cd68275fe2d614cfc252a79360680efb8d03bcd3e0767cc
-
SSDEEP
24576:Z8FG0TfXWkUIxxxR8gOaoMze817T1Gr80:6XXWAR7OcTg
-
Blocklisted process makes network request
-