General

  • Target

    2616-6-0x0000000002780000-0x0000000002974000-memory.dmp

  • Size

    2.0MB

  • MD5

    fb3b612fe8b678dacb3bd93731457983

  • SHA1

    f6ff89eae15abab202a02dfb52b254318636a2ba

  • SHA256

    e79da8af7a515737fa3c9fbfaf2c623d97ee6ff5ca1120dc79226abb990378a4

  • SHA512

    1e276bcc8ba41aa73f44834873f1804d21d071daf7942559bc1e701d9921d0dbdbcdcfd8be6a8c1bd952a4bfefdfebf6c19fa3a447a06f4f9588488be6eb0081

  • SSDEEP

    49152:OWPKYJVH/aMXKRDD9HkzTnPxQ6kcpTw/+dpqfn8+nFFQCxEsJwKQBL:OGKYJVH/aMXKRDD9HkzTPxQ6ldpqf8+W

Score
10/10

Malware Config

Extracted

Family

danabot

Botnet

40

C2

185.117.90.36:443

193.42.36.59:443

193.56.146.53:443

185.106.123.228:443

Attributes
  • embedded_hash

    07284E2A3AB3C2E1FFFBD425849BE150

  • type

    loader

rsa_pubkey.plain
rsa_privkey.plain

Signatures

  • Danabot Loader Component 1 IoCs
  • Danabot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2616-6-0x0000000002780000-0x0000000002974000-memory.dmp
    .dll windows:5 windows x86 arch:x86


    Headers

    Sections