General

  • Target

    7c74da5310051d5e8998b9ae20148c0c1cdf4b397aa652d9dc20030b4c5a5567.dll

  • Size

    1.9MB

  • Sample

    241120-dlhmkstqfr

  • MD5

    f367f5c54b4631cd53e5430bbed2fd03

  • SHA1

    52c139184c0c53b7b2d814f0803ff89c9aefe58e

  • SHA256

    7c74da5310051d5e8998b9ae20148c0c1cdf4b397aa652d9dc20030b4c5a5567

  • SHA512

    3dd8aa47473806e8bbda087b128fd440159840c2cf233aa9c048262e1992a45fdbf4068e30864830c5227a212a00d5a4f197d6a5ae93dff7d2f9dbd4ba4a9e10

  • SSDEEP

    49152:bQU1aLhQhG5NUAgoOa8nBc0SmmdWwMLwktw4BXeiqfn8+nFFQCxEsJwKQX:bfaNQh+NUABO/c0Y9AdIiqf8+gqJW

Malware Config

Extracted

Family

danabot

Botnet

40

C2

185.117.90.36:443

193.42.36.59:443

193.56.146.53:443

185.106.123.228:443

Attributes
  • embedded_hash

    07284E2A3AB3C2E1FFFBD425849BE150

  • type

    loader

rsa_pubkey.plain
rsa_privkey.plain

Targets

    • Target

      7c74da5310051d5e8998b9ae20148c0c1cdf4b397aa652d9dc20030b4c5a5567.dll

    • Size

      1.9MB

    • MD5

      f367f5c54b4631cd53e5430bbed2fd03

    • SHA1

      52c139184c0c53b7b2d814f0803ff89c9aefe58e

    • SHA256

      7c74da5310051d5e8998b9ae20148c0c1cdf4b397aa652d9dc20030b4c5a5567

    • SHA512

      3dd8aa47473806e8bbda087b128fd440159840c2cf233aa9c048262e1992a45fdbf4068e30864830c5227a212a00d5a4f197d6a5ae93dff7d2f9dbd4ba4a9e10

    • SSDEEP

      49152:bQU1aLhQhG5NUAgoOa8nBc0SmmdWwMLwktw4BXeiqfn8+nFFQCxEsJwKQX:bfaNQh+NUABO/c0Y9AdIiqf8+gqJW

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot Loader Component

    • Danabot family

    • Blocklisted process makes network request

MITRE ATT&CK Enterprise v15

Tasks