General
-
Target
1b0c60f4bef8c0737a1d3e70f9e666bb
-
Size
1.3MB
-
Sample
231230-rg151shdf3
-
MD5
1b0c60f4bef8c0737a1d3e70f9e666bb
-
SHA1
1b1853b786e95af43d858f4fa6452b5e9003e92f
-
SHA256
4f6683c92d4010987e11a8a8d41f6f795c58af4337c95652de402a169c26cf66
-
SHA512
5e98a024df98ec741699d98441f7e25a81ae8cb7e72db68e243c1dc1ea05215c60716e16d1034f1d1bb46fe25cc79738017c1fae8a9705f0fc18d1ba3dc0507f
-
SSDEEP
24576:NcF2f8wz+4UI1IXuQr1B76XPgQ2REackn0/TfYSXVm:uzVr1B7GGR3aTE
Behavioral task
behavioral1
Sample
1b0c60f4bef8c0737a1d3e70f9e666bb.dll
Resource
win7-20231215-en
Malware Config
Extracted
danabot
4
23.229.29.48:443
5.9.224.204:443
192.210.222.81:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
Targets
-
-
Target
1b0c60f4bef8c0737a1d3e70f9e666bb
-
Size
1.3MB
-
MD5
1b0c60f4bef8c0737a1d3e70f9e666bb
-
SHA1
1b1853b786e95af43d858f4fa6452b5e9003e92f
-
SHA256
4f6683c92d4010987e11a8a8d41f6f795c58af4337c95652de402a169c26cf66
-
SHA512
5e98a024df98ec741699d98441f7e25a81ae8cb7e72db68e243c1dc1ea05215c60716e16d1034f1d1bb46fe25cc79738017c1fae8a9705f0fc18d1ba3dc0507f
-
SSDEEP
24576:NcF2f8wz+4UI1IXuQr1B76XPgQ2REackn0/TfYSXVm:uzVr1B7GGR3aTE
-
Danabot Loader Component
-
Blocklisted process makes network request
-