Analysis
-
max time kernel
148s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2024 17:27
Behavioral task
behavioral1
Sample
594a01db0a35bdebb7ed68dc99492d11.dll
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
General
-
Target
594a01db0a35bdebb7ed68dc99492d11.dll
-
Size
1.3MB
-
MD5
594a01db0a35bdebb7ed68dc99492d11
-
SHA1
a1bc6233c2db3d8e9e2c80f19f17fed36ea3c716
-
SHA256
194747dde34eee13a778cc1d46798df62ec53e1db2d3e374264db8da9798f4c5
-
SHA512
376a669a74a0303be3536e5fd80f0da7e9ad75e76aabaf7626ce013a967b96ed85dc62312d8ae76ef40797eda123cf8bd2a9dd6abff3895d1794d6227f9cfb23
-
SSDEEP
24576:NcF2f8wz+4UI1IXuQr1B76XPgQ2REackn0aTfYSXVm:uzVr1B7GGR3LTE
Malware Config
Extracted
Family
danabot
Botnet
4
C2
23.229.29.48:443
5.9.224.204:443
192.210.222.81:443
Attributes
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
rsa_pubkey.plain
rsa_privkey.plain
Signatures
-
Danabot Loader Component 1 IoCs
resource yara_rule behavioral2/memory/4524-0-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 1 IoCs
flow pid Process 1 4524 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1612 wrote to memory of 4524 1612 rundll32.exe 86 PID 1612 wrote to memory of 4524 1612 rundll32.exe 86 PID 1612 wrote to memory of 4524 1612 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\594a01db0a35bdebb7ed68dc99492d11.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\594a01db0a35bdebb7ed68dc99492d11.dll,#12⤵
- Blocklisted process makes network request
PID:4524
-