General
-
Target
0c13e3cdc49f0ff630b1b88cd02c3fe1
-
Size
1.3MB
-
Sample
231224-w6n9zaadg8
-
MD5
0c13e3cdc49f0ff630b1b88cd02c3fe1
-
SHA1
9fc58ec62a89813ea0bf9eee4d507895c63be46a
-
SHA256
785514ebf057bf14ef8a67d20fcf3665d1b5940749eb35ea80ca0b1e2d5dbad4
-
SHA512
2f58f036b9bb38dde803b13dcde2371517f625108dcd08488ce909fa4e893d3750e1b8b7e39087dc99b0260e6f5ff9433f48c939bbc9373f3e4e93a20790e8d0
-
SSDEEP
24576:7cFPy5R2ZlXVchmkLA5vmsUsSAApF/4MTcjQ:gP0hkZU/p9tTw
Behavioral task
behavioral1
Sample
0c13e3cdc49f0ff630b1b88cd02c3fe1.dll
Resource
win7-20231215-en
Malware Config
Extracted
danabot
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
Targets
-
-
Target
0c13e3cdc49f0ff630b1b88cd02c3fe1
-
Size
1.3MB
-
MD5
0c13e3cdc49f0ff630b1b88cd02c3fe1
-
SHA1
9fc58ec62a89813ea0bf9eee4d507895c63be46a
-
SHA256
785514ebf057bf14ef8a67d20fcf3665d1b5940749eb35ea80ca0b1e2d5dbad4
-
SHA512
2f58f036b9bb38dde803b13dcde2371517f625108dcd08488ce909fa4e893d3750e1b8b7e39087dc99b0260e6f5ff9433f48c939bbc9373f3e4e93a20790e8d0
-
SSDEEP
24576:7cFPy5R2ZlXVchmkLA5vmsUsSAApF/4MTcjQ:gP0hkZU/p9tTw
-
Danabot Loader Component
-
Blocklisted process makes network request
-