General

  • Target

    e28b71ca332112c2709c20f4d993a819e2562618f79c9404e9b2d4a58b16cab0.dll

  • Size

    1.9MB

  • Sample

    241104-dhmr5asbjh

  • MD5

    5e43a9cbf8dc4f82a2b19ce44ff14fe8

  • SHA1

    151051d4041f386e0314d42322898664da205c48

  • SHA256

    e28b71ca332112c2709c20f4d993a819e2562618f79c9404e9b2d4a58b16cab0

  • SHA512

    a9d072b6b60791c49ff43c861b4121667f38db309ab8a93c35431fa21a31a9526501e9f8b8aaa6d5523237d24f121c2be2b152e3694eb473c7ec98cd39ede572

  • SSDEEP

    49152:SQU1aLhQhG5NUAgoOa8nBc0SmmdWwMLwktw4Ble3qfn8+nFFQCxEsJwKQg:SfaNQh+NUABO/c0Y9AdO3qf8+gqJW

Malware Config

Extracted

Family

danabot

Botnet

40

C2

185.117.90.36:443

193.42.36.59:443

193.56.146.53:443

185.106.123.228:443

Attributes
  • embedded_hash

    07284E2A3AB3C2E1FFFBD425849BE150

  • type

    loader

rsa_pubkey.plain
rsa_privkey.plain

Targets

    • Target

      e28b71ca332112c2709c20f4d993a819e2562618f79c9404e9b2d4a58b16cab0.dll

    • Size

      1.9MB

    • MD5

      5e43a9cbf8dc4f82a2b19ce44ff14fe8

    • SHA1

      151051d4041f386e0314d42322898664da205c48

    • SHA256

      e28b71ca332112c2709c20f4d993a819e2562618f79c9404e9b2d4a58b16cab0

    • SHA512

      a9d072b6b60791c49ff43c861b4121667f38db309ab8a93c35431fa21a31a9526501e9f8b8aaa6d5523237d24f121c2be2b152e3694eb473c7ec98cd39ede572

    • SSDEEP

      49152:SQU1aLhQhG5NUAgoOa8nBc0SmmdWwMLwktw4Ble3qfn8+nFFQCxEsJwKQg:SfaNQh+NUABO/c0Y9AdO3qf8+gqJW

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot Loader Component

    • Danabot family

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks