General
-
Target
a40b8f61420b24835c93f7974f39a23e
-
Size
1.2MB
-
Sample
240225-r2gbcadh83
-
MD5
a40b8f61420b24835c93f7974f39a23e
-
SHA1
bce1227b915b76825b3589c3b60ccc2e114f7dd2
-
SHA256
f8c983fce1af5b6e17289a88d19a70fb5a67c6bc32d7aa4f3bc3ce1ffcddc282
-
SHA512
75b81661d3758b207b1f2dfc8d5dd40bd868934b931f0c0513e5d1f95ba665b7949b8db8528351d55b18f443a644094f57d07c85317510961b5f5a9a1353f95a
-
SSDEEP
24576:7xBaQMsE+VUxLY8VKUgln+NNTbhbY1oY2vTCtKz7HD53J:7N7yK5a6YTSe7V3J
Static task
static1
Behavioral task
behavioral1
Sample
a40b8f61420b24835c93f7974f39a23e.exe
Resource
win7-20240220-en
Malware Config
Extracted
danabot
4
142.11.206.50:443
142.11.244.124:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
Targets
-
-
Target
a40b8f61420b24835c93f7974f39a23e
-
Size
1.2MB
-
MD5
a40b8f61420b24835c93f7974f39a23e
-
SHA1
bce1227b915b76825b3589c3b60ccc2e114f7dd2
-
SHA256
f8c983fce1af5b6e17289a88d19a70fb5a67c6bc32d7aa4f3bc3ce1ffcddc282
-
SHA512
75b81661d3758b207b1f2dfc8d5dd40bd868934b931f0c0513e5d1f95ba665b7949b8db8528351d55b18f443a644094f57d07c85317510961b5f5a9a1353f95a
-
SSDEEP
24576:7xBaQMsE+VUxLY8VKUgln+NNTbhbY1oY2vTCtKz7HD53J:7N7yK5a6YTSe7V3J
-
Danabot Loader Component
-
Blocklisted process makes network request
-
Loads dropped DLL
-