Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2024 10:50
Behavioral task
behavioral1
Sample
6f7ba8ec951ec19f877c8a291123c66f.dll
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
6f7ba8ec951ec19f877c8a291123c66f.dll
-
Size
1.3MB
-
MD5
6f7ba8ec951ec19f877c8a291123c66f
-
SHA1
b7652fae75bc64ced570a55ac3e71e8b78ea9db6
-
SHA256
8cbd7bce3915b58b0621771655d3aa30cab46d3dfb3fb674b8f508cf206fe0f7
-
SHA512
7495db6ba499af73705253056aa4a6531651fcb87fc8b438818f0633c87cd932fbbc6910bd9324c03d61bc11efd8f0ae19b802066de87ef7552c257dd2cf4683
-
SSDEEP
24576:lcF27XPVrblcfqDtR98Vpk/3alJJkT9J:GeBR9ApkEJ6T
Malware Config
Extracted
Family
danabot
Botnet
4
C2
23.229.29.48:443
5.9.224.204:443
192.210.222.81:443
Attributes
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
rsa_pubkey.plain
rsa_privkey.plain
Signatures
-
Danabot Loader Component 14 IoCs
Processes:
resource yara_rule behavioral2/memory/3976-0-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3976-1-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3976-2-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3976-3-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3976-4-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3976-5-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3976-6-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3976-7-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3976-8-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3976-9-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3976-10-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3976-11-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3976-12-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 behavioral2/memory/3976-13-0x0000000000400000-0x0000000000561000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 1 3976 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 244 wrote to memory of 3976 244 rundll32.exe rundll32.exe PID 244 wrote to memory of 3976 244 rundll32.exe rundll32.exe PID 244 wrote to memory of 3976 244 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6f7ba8ec951ec19f877c8a291123c66f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6f7ba8ec951ec19f877c8a291123c66f.dll,#12⤵
- Blocklisted process makes network request
PID:3976
-