General
-
Target
a049e4d179686744b0e4e6472aadecb8
-
Size
1.2MB
-
Sample
240216-ns91hsab2s
-
MD5
a049e4d179686744b0e4e6472aadecb8
-
SHA1
2aedafb10302fe4121858e8233f826f8260d63ff
-
SHA256
4a05a54dfa70ecd26651badbc03975c7c896e0a2f17acb030acf8d12441276a5
-
SHA512
b2420e1cbc41d44fa48142e4a3f5c169c92db19ea5cde723dfbb01f1ff0f16ed0598636176c64298f405fcdbd86bcb9a94f43d135d4e68448a99ce8de62ff6ea
-
SSDEEP
24576:aifXVeSyIuPNpoRP2BmhqNw1N/HWlRM2g/dI8/nJq1:aeeXPNp22BwoNk2g/dI8R
Static task
static1
Behavioral task
behavioral1
Sample
a049e4d179686744b0e4e6472aadecb8.exe
Resource
win7-20231129-en
Malware Config
Extracted
danabot
4
23.229.29.48:443
5.9.224.204:443
192.210.222.81:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
Targets
-
-
Target
a049e4d179686744b0e4e6472aadecb8
-
Size
1.2MB
-
MD5
a049e4d179686744b0e4e6472aadecb8
-
SHA1
2aedafb10302fe4121858e8233f826f8260d63ff
-
SHA256
4a05a54dfa70ecd26651badbc03975c7c896e0a2f17acb030acf8d12441276a5
-
SHA512
b2420e1cbc41d44fa48142e4a3f5c169c92db19ea5cde723dfbb01f1ff0f16ed0598636176c64298f405fcdbd86bcb9a94f43d135d4e68448a99ce8de62ff6ea
-
SSDEEP
24576:aifXVeSyIuPNpoRP2BmhqNw1N/HWlRM2g/dI8/nJq1:aeeXPNp22BwoNk2g/dI8R
-
Danabot Loader Component
-
Blocklisted process makes network request
-
Loads dropped DLL
-