Analysis
-
max time kernel
146s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2024 10:25
Behavioral task
behavioral1
Sample
771badc84e677aa3a3a5449f6e75380e.dll
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
771badc84e677aa3a3a5449f6e75380e.dll
-
Size
1.3MB
-
MD5
771badc84e677aa3a3a5449f6e75380e
-
SHA1
5c7dea1af55350ab4117156a362d33899fce4ea7
-
SHA256
dd91475494e4d93d84cc3f322775d0b7f72a8ba2c2f67e00aaedc69ed31fac50
-
SHA512
30865ccb9cd89368dc937058d57daf0c8e406819684189622b83c8f2b64f1bd0b6949a6abdd0f1dea854993305ae8c584c4020fa9cb39087e47784cd2fe345e1
-
SSDEEP
24576:78FG65iH5eqtKQBkpjvwykPYZVWtjUcTyZ1bn:gTT7MhJTe
Malware Config
Extracted
Family
danabot
Botnet
4
C2
23.229.29.48:443
5.9.224.204:443
192.210.222.81:443
Attributes
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
rsa_pubkey.plain
rsa_privkey.plain
Signatures
-
Danabot Loader Component 14 IoCs
Processes:
resource yara_rule behavioral2/memory/1460-0-0x0000000000400000-0x0000000000560000-memory.dmp DanabotLoader2021 behavioral2/memory/1460-1-0x0000000000400000-0x0000000000560000-memory.dmp DanabotLoader2021 behavioral2/memory/1460-2-0x0000000000400000-0x0000000000560000-memory.dmp DanabotLoader2021 behavioral2/memory/1460-3-0x0000000000400000-0x0000000000560000-memory.dmp DanabotLoader2021 behavioral2/memory/1460-4-0x0000000000400000-0x0000000000560000-memory.dmp DanabotLoader2021 behavioral2/memory/1460-5-0x0000000000400000-0x0000000000560000-memory.dmp DanabotLoader2021 behavioral2/memory/1460-6-0x0000000000400000-0x0000000000560000-memory.dmp DanabotLoader2021 behavioral2/memory/1460-7-0x0000000000400000-0x0000000000560000-memory.dmp DanabotLoader2021 behavioral2/memory/1460-8-0x0000000000400000-0x0000000000560000-memory.dmp DanabotLoader2021 behavioral2/memory/1460-9-0x0000000000400000-0x0000000000560000-memory.dmp DanabotLoader2021 behavioral2/memory/1460-10-0x0000000000400000-0x0000000000560000-memory.dmp DanabotLoader2021 behavioral2/memory/1460-11-0x0000000000400000-0x0000000000560000-memory.dmp DanabotLoader2021 behavioral2/memory/1460-12-0x0000000000400000-0x0000000000560000-memory.dmp DanabotLoader2021 behavioral2/memory/1460-13-0x0000000000400000-0x0000000000560000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 3 1460 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3580 wrote to memory of 1460 3580 rundll32.exe rundll32.exe PID 3580 wrote to memory of 1460 3580 rundll32.exe rundll32.exe PID 3580 wrote to memory of 1460 3580 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\771badc84e677aa3a3a5449f6e75380e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\771badc84e677aa3a3a5449f6e75380e.dll,#12⤵
- Blocklisted process makes network request
PID:1460