Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 21:19
Behavioral task
behavioral1
Sample
c1a13a3d34662408484cbc94d0a9b149.dll
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
c1a13a3d34662408484cbc94d0a9b149.dll
-
Size
1.3MB
-
MD5
c1a13a3d34662408484cbc94d0a9b149
-
SHA1
b100ff2e84550a0e3cae7d34623489311b560651
-
SHA256
b00c027286c3f38a6733ec8df69ef917fa366ee306136fe689510576b8891578
-
SHA512
39c576c1af926e048cf6043170eb91a6b116439abbf6d2ec210f2e70e182d1c9897dda34fead84a6b5e3adf48196a17138e2660da17e817910c4327528f51033
-
SSDEEP
24576:98FPiQGaAYVNkHm3xm9TPGmBJP35oTIs:etRI9TPHJPJoT
Malware Config
Extracted
Family
danabot
Botnet
4
C2
142.11.244.124:443
142.11.206.50:443
Attributes
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
-
type
loader
rsa_pubkey.plain
rsa_privkey.plain
Signatures
-
Danabot Loader Component 15 IoCs
resource yara_rule behavioral2/memory/2236-0-0x00000000005E0000-0x000000000073E000-memory.dmp DanabotLoader2021 behavioral2/memory/2236-1-0x00000000005E0000-0x000000000073E000-memory.dmp DanabotLoader2021 behavioral2/memory/2236-2-0x00000000005E0000-0x000000000073E000-memory.dmp DanabotLoader2021 behavioral2/memory/2236-3-0x00000000005E0000-0x000000000073E000-memory.dmp DanabotLoader2021 behavioral2/memory/2236-4-0x00000000005E0000-0x000000000073E000-memory.dmp DanabotLoader2021 behavioral2/memory/2236-5-0x00000000005E0000-0x000000000073E000-memory.dmp DanabotLoader2021 behavioral2/memory/2236-6-0x00000000005E0000-0x000000000073E000-memory.dmp DanabotLoader2021 behavioral2/memory/2236-7-0x00000000005E0000-0x000000000073E000-memory.dmp DanabotLoader2021 behavioral2/memory/2236-8-0x00000000005E0000-0x000000000073E000-memory.dmp DanabotLoader2021 behavioral2/memory/2236-9-0x00000000005E0000-0x000000000073E000-memory.dmp DanabotLoader2021 behavioral2/memory/2236-10-0x00000000005E0000-0x000000000073E000-memory.dmp DanabotLoader2021 behavioral2/memory/2236-11-0x00000000005E0000-0x000000000073E000-memory.dmp DanabotLoader2021 behavioral2/memory/2236-12-0x00000000005E0000-0x000000000073E000-memory.dmp DanabotLoader2021 behavioral2/memory/2236-13-0x00000000005E0000-0x000000000073E000-memory.dmp DanabotLoader2021 behavioral2/memory/2236-14-0x00000000005E0000-0x000000000073E000-memory.dmp DanabotLoader2021 -
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2236 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1576 wrote to memory of 2236 1576 rundll32.exe 88 PID 1576 wrote to memory of 2236 1576 rundll32.exe 88 PID 1576 wrote to memory of 2236 1576 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1a13a3d34662408484cbc94d0a9b149.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1a13a3d34662408484cbc94d0a9b149.dll,#12⤵
- Blocklisted process makes network request
PID:2236
-