General
-
Target
459aaa0523583f8171f012b9d7dd7136.exe
-
Size
1.2MB
-
Sample
240106-l4rxzadben
-
MD5
459aaa0523583f8171f012b9d7dd7136
-
SHA1
c30963a51a9098d0260121ccb38e92f86091bc16
-
SHA256
c3cb419c2c74276267a476c49fbda1b8e7700cbf03de07e4bf46523b095bbe2e
-
SHA512
b2fde3a655835444b9bc755673ea1af48407a4a4ba6d366af295772e506cbba914c25b3cb7dd28fb602be81508be5736a8b16a2c716d242cab8b66b2433b46cd
-
SSDEEP
24576:BBBf28CgzCfAfb6YvKnnqb/80owFU1v3FHfAit48P:Cg1b6iKB0NFue98P
Static task
static1
Behavioral task
behavioral1
Sample
459aaa0523583f8171f012b9d7dd7136.exe
Resource
win7-20231129-en
Malware Config
Extracted
danabot
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
Targets
-
-
Target
459aaa0523583f8171f012b9d7dd7136.exe
-
Size
1.2MB
-
MD5
459aaa0523583f8171f012b9d7dd7136
-
SHA1
c30963a51a9098d0260121ccb38e92f86091bc16
-
SHA256
c3cb419c2c74276267a476c49fbda1b8e7700cbf03de07e4bf46523b095bbe2e
-
SHA512
b2fde3a655835444b9bc755673ea1af48407a4a4ba6d366af295772e506cbba914c25b3cb7dd28fb602be81508be5736a8b16a2c716d242cab8b66b2433b46cd
-
SSDEEP
24576:BBBf28CgzCfAfb6YvKnnqb/80owFU1v3FHfAit48P:Cg1b6iKB0NFue98P
-
Danabot Loader Component
-
Blocklisted process makes network request
-
Loads dropped DLL
-