General

  • Target

    2380-8-0x00000000021C0000-0x00000000023B4000-memory.dmp

  • Size

    2.0MB

  • MD5

    3cd005be4f091e3c5ee9ece4fe6b8de2

  • SHA1

    cd2b94390265ad95522f574eb3ee9d01c14d64bb

  • SHA256

    eddf811a78f45bac1615bd41c7587384d05d5ea20b339d7dcffa0ac6aca01e2d

  • SHA512

    a1f978e7b3ffd8e85713cb261d600ebe9aeb6515dc80ed471784fa30552e3467208696d6a92d71b0df59098ea319e317a9a1d5202f791074a8fe30cd19a50a13

  • SSDEEP

    49152:OWPKYJVH/aMXKRDD9HkzTnPxQ6kcpTg/+hlqfn8+nFFQCxEsJwKQa:OGKYJVH/aMXKRDD9HkzTPxQ65hlqf8+W

Score
10/10

Malware Config

Extracted

Family

danabot

Botnet

40

C2

185.117.90.36:443

193.42.36.59:443

193.56.146.53:443

185.106.123.228:443

Attributes
  • embedded_hash

    07284E2A3AB3C2E1FFFBD425849BE150

  • type

    loader

rsa_pubkey.plain
rsa_privkey.plain

Signatures

  • Danabot Loader Component 1 IoCs
  • Danabot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2380-8-0x00000000021C0000-0x00000000023B4000-memory.dmp
    .dll windows:5 windows x86 arch:x86


    Headers

    Sections