General
-
Target
3040-4-0x0000000001FA0000-0x0000000002194000-memory.dmp
-
Size
2.0MB
-
Sample
241119-pxaxnawhqp
-
MD5
818c4b066a91bd42bb03e49c014ca0b4
-
SHA1
4d1da42bc4dec5fae3f0d3c361c95d299194cb90
-
SHA256
8a3a06e39d8ef48dcd7319fd507d229b640f41aa5b81dd1deefedb55fd31cabc
-
SHA512
1b33d326a41fb55a88c9338cfb09c854026b1d8de73f032d4bcc3486199816a198d2400ab1a085d9687bce6225143c7a33c7f9a986530cc0acbf164b54d06c68
-
SSDEEP
49152:OWPKYJVH/aMXKRDD9HkzTnPxQ6kcpTE/+jVqfn8+nFFQCxEsJwKQ/:OGKYJVH/aMXKRDD9HkzTPxQ6djVqf8+W
Behavioral task
behavioral1
Sample
3040-4-0x0000000001FA0000-0x0000000002194000-memory.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3040-4-0x0000000001FA0000-0x0000000002194000-memory.dll
Resource
win10v2004-20241007-en
Malware Config
Extracted
danabot
40
185.117.90.36:443
193.42.36.59:443
193.56.146.53:443
185.106.123.228:443
-
embedded_hash
07284E2A3AB3C2E1FFFBD425849BE150
-
type
loader
Targets
-
-
Target
3040-4-0x0000000001FA0000-0x0000000002194000-memory.dmp
-
Size
2.0MB
-
MD5
818c4b066a91bd42bb03e49c014ca0b4
-
SHA1
4d1da42bc4dec5fae3f0d3c361c95d299194cb90
-
SHA256
8a3a06e39d8ef48dcd7319fd507d229b640f41aa5b81dd1deefedb55fd31cabc
-
SHA512
1b33d326a41fb55a88c9338cfb09c854026b1d8de73f032d4bcc3486199816a198d2400ab1a085d9687bce6225143c7a33c7f9a986530cc0acbf164b54d06c68
-
SSDEEP
49152:OWPKYJVH/aMXKRDD9HkzTnPxQ6kcpTE/+jVqfn8+nFFQCxEsJwKQ/:OGKYJVH/aMXKRDD9HkzTPxQ6djVqf8+W
Score3/10 -