General
-
Target
83a8566ee1e6ec8379827feecb6998f0_JaffaCakes118
-
Size
283KB
-
Sample
240809-1ksgqazhkj
-
MD5
83a8566ee1e6ec8379827feecb6998f0
-
SHA1
611085c13928e7cd5fd61ca4674a6a93f72ad9cd
-
SHA256
49d02f4531e1ebb55baa972e864007aed08a66b7ac774bddff09740ea032d76a
-
SHA512
5798b74b2d583e7a3b75bfe196b2e2336f8997d8663700aaf9b3321ed3e010696e56276d4c37940c839900cb7a0510811553848286a0ca30d01cd1f3b2093d11
-
SSDEEP
6144:mjkoRUNBPrzWez2nTND1FZamObdiMI1jDjRnY1ga:mdQB1z2TND/ZaZdiMIlDjeqa
Static task
static1
Behavioral task
behavioral1
Sample
DHL__Rechunung__0410028402789110_050519.vbs
Resource
win7-20240708-en
Malware Config
Extracted
danabot
149.28.180.182
178.209.51.211
194.25.251.32
60.188.203.101
150.4.101.118
240.76.254.6
72.83.147.19
159.89.40.32
242.219.180.36
12.11.98.168
Targets
-
-
Target
DHL__Rechunung__0410028402789110_050519.vbs
-
Size
1.5MB
-
MD5
97006e3717808b66068224c2eb5a7f96
-
SHA1
5275beeda8913200da233d246426f755e317c2e7
-
SHA256
bc1df223f55447fa64591fcfc70605dbce6de1bdccbe8eeaef1b514566d3c33a
-
SHA512
35e008d8dfefb0662ac0b010eba07c013604090f2033be12e1327cd48b34aaf7c77993b5a1294dba4a26ac8c91d8b5a40f80b6daaa1dc2561d4da7a07d251bdd
-
SSDEEP
3072:unrlwwQ7jd05xN3FH+JdpHiyXA6yQgd8ktGpkHlRUxL4HDDqIA5Zibwn4NoypNz5:yxtdZOJ1hkUti
-
Danabot x86 payload
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-