General
-
Target
b7c085a814f6decb7fac3218e9737435
-
Size
1.1MB
-
Sample
240306-szqbxacc61
-
MD5
b7c085a814f6decb7fac3218e9737435
-
SHA1
ca62d1a941e91a7a410c780ff7e60dd349ded93a
-
SHA256
f63dee9e804b9e07c7d7ec013117124dcc92c89e6c632e973140e39296858da7
-
SHA512
f9a06761608727e043a86520e1395253c7c0bc881efe13427b04cacba10ef7e52c5c38988faad82ba1ba546022a292db1031100fc69a151ab7bf33e4d8f6396a
-
SSDEEP
24576:YGFY4tXZlXTrSGiLGg1uMs0qssTrNvVQlMofbS1Nq5FRv2nbB:YMdrzig00XPQSofbkuuF
Static task
static1
Behavioral task
behavioral1
Sample
b7c085a814f6decb7fac3218e9737435.exe
Resource
win7-20240220-en
Malware Config
Extracted
danabot
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
Targets
-
-
Target
b7c085a814f6decb7fac3218e9737435
-
Size
1.1MB
-
MD5
b7c085a814f6decb7fac3218e9737435
-
SHA1
ca62d1a941e91a7a410c780ff7e60dd349ded93a
-
SHA256
f63dee9e804b9e07c7d7ec013117124dcc92c89e6c632e973140e39296858da7
-
SHA512
f9a06761608727e043a86520e1395253c7c0bc881efe13427b04cacba10ef7e52c5c38988faad82ba1ba546022a292db1031100fc69a151ab7bf33e4d8f6396a
-
SSDEEP
24576:YGFY4tXZlXTrSGiLGg1uMs0qssTrNvVQlMofbS1Nq5FRv2nbB:YMdrzig00XPQSofbkuuF
-
Danabot Loader Component
-
Blocklisted process makes network request
-
Loads dropped DLL
-