General

  • Target

    2768-12-0x0000000003C80000-0x0000000004B11000-memory.dmp

  • Size

    14.6MB

  • MD5

    ecc458fe67ec78d4c55638e3ccc5e8f5

  • SHA1

    79c9c099cb79eacce1bfcc1f29e4efeecdaa58c1

  • SHA256

    8720891ba314c13d0a4d93396bcc49d97c5f26bade78025cd5537ce4ece96c5f

  • SHA512

    50b3b7c00fa03b50975dd54146be6f9a835ee847ac4342942e596f4ab7d4f3283e262e0b25930777f9255a542bac0e217623bf6a227d1f3ad1e71ff822e9781c

  • SSDEEP

    196608:xpLUipF5Xcu4GSOh6TALEHrcDaitwrtvF1dPj/voTeaXf6:7LZFCuzSKk2aYMF1hTvb

Score
10/10

Malware Config

Extracted

Family

danabot

Attributes
  • type

    loader

Signatures

  • Danabot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2768-12-0x0000000003C80000-0x0000000004B11000-memory.dmp
    .dll windows:5 windows x86 arch:x86


    Headers

    Sections