General
-
Target
059d57ff14286b83bb8e2dc9cd441b53
-
Size
1.3MB
-
Sample
231229-2d5n5sggf6
-
MD5
059d57ff14286b83bb8e2dc9cd441b53
-
SHA1
46f4d175cdf48eb41924ebc16b9999f26a2994d2
-
SHA256
e3cecabfca4d44f1678dc7e973e0fa66628ddfcfb89a57990e9234755b86695b
-
SHA512
e7f9111c42034a78cc37f044f3b1325bd61b378a1813b81cd7047d7845b03f675f079e93d547b0035d6cddb17da0a0bf2532d0066fad38d080faa6a791d41a8a
-
SSDEEP
24576:6cF2/5xfJuojvesVySg8boLb6/yjhTuu:B6f5bnb4FT
Behavioral task
behavioral1
Sample
059d57ff14286b83bb8e2dc9cd441b53.dll
Resource
win7-20231215-en
Malware Config
Extracted
danabot
4
23.229.29.48:443
5.9.224.204:443
192.210.222.81:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
Targets
-
-
Target
059d57ff14286b83bb8e2dc9cd441b53
-
Size
1.3MB
-
MD5
059d57ff14286b83bb8e2dc9cd441b53
-
SHA1
46f4d175cdf48eb41924ebc16b9999f26a2994d2
-
SHA256
e3cecabfca4d44f1678dc7e973e0fa66628ddfcfb89a57990e9234755b86695b
-
SHA512
e7f9111c42034a78cc37f044f3b1325bd61b378a1813b81cd7047d7845b03f675f079e93d547b0035d6cddb17da0a0bf2532d0066fad38d080faa6a791d41a8a
-
SSDEEP
24576:6cF2/5xfJuojvesVySg8boLb6/yjhTuu:B6f5bnb4FT
-
Danabot Loader Component
-
Blocklisted process makes network request
-