General
-
Target
c549198f0d47c31c34a963459dacf01c_JaffaCakes118
-
Size
195KB
-
Sample
240827-s263faxhkf
-
MD5
c549198f0d47c31c34a963459dacf01c
-
SHA1
12545c2f885768b86fd34423acad55bacc2547e1
-
SHA256
521285f06a333265d47f478c9cf7bbc0e211caf979824b64c9f940b6acf88a27
-
SHA512
d4d29ba155cbc25d2355e66bec230f6b90ddf91c08b9424415291080f291875788bee40a43fea04cc8747cb0b7015fb7335cb34902333a6fda3dd411b0bf2cbd
-
SSDEEP
6144:Y8qaM4xUNPgd0+uQTe/7m0d0j5i7JTWl77pf8:Y8OsM/73KsRWl7y
Static task
static1
Behavioral task
behavioral1
Sample
2039930_01029.js
Resource
win7-20240708-en
Malware Config
Extracted
danabot
164.175.70.152
89.144.25.243
86.177.194.155
29.195.96.191
29.43.1.29
84.215.94.117
115.58.63.174
89.144.25.104
199.179.34.46
68.48.87.153
Targets
-
-
Target
2039930_01029.js
-
Size
1.0MB
-
MD5
d115552252592f589e7412d6650a949e
-
SHA1
ad4c6cd7e85541866f5cd0fa747b7f08a5fe8067
-
SHA256
3b55010b7f8f4e7ded435b29af5d00f98c06dd8f14258355d0049f186f4a6bbc
-
SHA512
461aebb7a488102e3de0c9b807dbf8d04a41737d050dc4ca95bbf8283ee5176845adafee6bf81db83a73af2b67e66f45adaad6a145062ae035208cee71adfa71
-
SSDEEP
1536:toTXaFN5VEYPznC2x1ZQu56WD/EYc9piGqvzlY84fEgZt32a2zO70tsE+TXURbtj:tS2uXtlk
-
Danabot x86 payload
Detection of Danabot x86 payload, mapped in memory during the execution of its loader.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-