General
-
Target
f6ce6862b033fd525f8107109b611494
-
Size
1.1MB
-
Sample
231222-t6vqmsccg3
-
MD5
f6ce6862b033fd525f8107109b611494
-
SHA1
3c4852490dd6867ee7378a992135e879aa5c8c43
-
SHA256
45dd283d2fea17ef301b58621868aaee1310a633d13f48b7f637c88092eb0cc2
-
SHA512
6160464f27221a5cf5ebfd95a4bf591f62ac96ce53f148ad3b890a0f4f9b9304ea241ac0ed0f446474fbfa7e9f900a524847a8bdbdcd2af9f6cf10c54c319704
-
SSDEEP
24576:Gg5k+DXw1y4yjeEzm8VMZhBFZfpCAB7SIjGpj/Af4+8ma0:GgK0AEVeElmvBFyaA7T+88
Static task
static1
Behavioral task
behavioral1
Sample
f6ce6862b033fd525f8107109b611494.exe
Resource
win7-20231215-en
Malware Config
Extracted
danabot
4
23.229.29.48:443
5.9.224.204:443
192.210.222.81:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
Targets
-
-
Target
f6ce6862b033fd525f8107109b611494
-
Size
1.1MB
-
MD5
f6ce6862b033fd525f8107109b611494
-
SHA1
3c4852490dd6867ee7378a992135e879aa5c8c43
-
SHA256
45dd283d2fea17ef301b58621868aaee1310a633d13f48b7f637c88092eb0cc2
-
SHA512
6160464f27221a5cf5ebfd95a4bf591f62ac96ce53f148ad3b890a0f4f9b9304ea241ac0ed0f446474fbfa7e9f900a524847a8bdbdcd2af9f6cf10c54c319704
-
SSDEEP
24576:Gg5k+DXw1y4yjeEzm8VMZhBFZfpCAB7SIjGpj/Af4+8ma0:GgK0AEVeElmvBFyaA7T+88
-
Danabot Loader Component
-
Blocklisted process makes network request
-
Loads dropped DLL
-