General
-
Target
592b072b05d4144f9e5242c8e9a1c88c
-
Size
1.1MB
-
Sample
240113-trl5ysdbd2
-
MD5
592b072b05d4144f9e5242c8e9a1c88c
-
SHA1
8294c8a81684a35a9a8e155788c2ccabad8b657c
-
SHA256
745ae9caf8a38023905ad52a4e81d085cef62fc4a14aacf2536c9e54cd1845f8
-
SHA512
9ee062e1380094efed830a46df76377d446a41f88c179a13a3b09bb47a145ebc5351dd02e3374d3d19de274dd0ddfdb0c11df18bc720ff171a478386eed2619a
-
SSDEEP
24576:vv2NFRfdDf+CRwEHhjLsWLcOeb9oQvU7/9EJojbfH0vZEr:mRf+Cy65My/KeHYu
Static task
static1
Behavioral task
behavioral1
Sample
592b072b05d4144f9e5242c8e9a1c88c.exe
Resource
win7-20231215-en
Malware Config
Extracted
danabot
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
Targets
-
-
Target
592b072b05d4144f9e5242c8e9a1c88c
-
Size
1.1MB
-
MD5
592b072b05d4144f9e5242c8e9a1c88c
-
SHA1
8294c8a81684a35a9a8e155788c2ccabad8b657c
-
SHA256
745ae9caf8a38023905ad52a4e81d085cef62fc4a14aacf2536c9e54cd1845f8
-
SHA512
9ee062e1380094efed830a46df76377d446a41f88c179a13a3b09bb47a145ebc5351dd02e3374d3d19de274dd0ddfdb0c11df18bc720ff171a478386eed2619a
-
SSDEEP
24576:vv2NFRfdDf+CRwEHhjLsWLcOeb9oQvU7/9EJojbfH0vZEr:mRf+Cy65My/KeHYu
-
Danabot Loader Component
-
Blocklisted process makes network request
-
Loads dropped DLL
-