General
-
Target
a12506001fec6fba3c9b4f7a9c837349
-
Size
1.3MB
-
Sample
240224-gxza9acd8w
-
MD5
a12506001fec6fba3c9b4f7a9c837349
-
SHA1
ee1077557fcd031a70b3bbb8aa82dcc273690c6f
-
SHA256
45498fc7ad058a572bb653f5307d549ac6f72c9c016a0f7f9b3134bbb8a5b29d
-
SHA512
d5e72bac10eb13992ccb8cb1e38b717a29682849a7bf30cefaba94a1bc36d000d5cb598a6e1be7ffccb81e2b713f6495d6d9f822468c69c65c2b58f1fd5c2278
-
SSDEEP
24576:y8pWEmNN85Fhyuqsghhg0SWKyolmi3TOfU:ZlMgYvoD3T6
Behavioral task
behavioral1
Sample
a12506001fec6fba3c9b4f7a9c837349.dll
Resource
win7-20240221-en
Malware Config
Extracted
danabot
4
23.229.29.48:443
5.9.224.204:443
192.210.222.81:443
-
embedded_hash
0E1A7A1479C37094441FA911262B322A
-
type
loader
Targets
-
-
Target
a12506001fec6fba3c9b4f7a9c837349
-
Size
1.3MB
-
MD5
a12506001fec6fba3c9b4f7a9c837349
-
SHA1
ee1077557fcd031a70b3bbb8aa82dcc273690c6f
-
SHA256
45498fc7ad058a572bb653f5307d549ac6f72c9c016a0f7f9b3134bbb8a5b29d
-
SHA512
d5e72bac10eb13992ccb8cb1e38b717a29682849a7bf30cefaba94a1bc36d000d5cb598a6e1be7ffccb81e2b713f6495d6d9f822468c69c65c2b58f1fd5c2278
-
SSDEEP
24576:y8pWEmNN85Fhyuqsghhg0SWKyolmi3TOfU:ZlMgYvoD3T6
-
Danabot Loader Component
-
Blocklisted process makes network request
-