General
-
Target
c00d207efb855910154389b48404e550_JaffaCakes118
-
Size
1.3MB
-
Sample
241204-a9q23stjcz
-
MD5
c00d207efb855910154389b48404e550
-
SHA1
5baa7a03331596f073b7ec03c72e8812d51f2cb3
-
SHA256
716e5a3d29ff525aed30c18061daff4b496f3f828ba2ac763efd857062a42e96
-
SHA512
5edd6b563c687a101786dd5e056d1c1392960b156492f8f1fe71140416361f14174dfdc1478b3b6616d591da7ab7114d594e6e765db047817886ce29cfca7247
-
SSDEEP
24576:qcFPyLyEv4NeAXD+Rk+p736lDEU4KgTfp:RQa+lKlDJgT
Behavioral task
behavioral1
Sample
c00d207efb855910154389b48404e550_JaffaCakes118.dll
Resource
win7-20241023-en
Malware Config
Extracted
danabot
15
192.52.167.44:443
192.52.166.92:443
192.52.167.45:443
173.254.204.95:443
-
embedded_hash
0A6B28F69364E1A0FC443E2439A8AD23
-
type
loader
Targets
-
-
Target
c00d207efb855910154389b48404e550_JaffaCakes118
-
Size
1.3MB
-
MD5
c00d207efb855910154389b48404e550
-
SHA1
5baa7a03331596f073b7ec03c72e8812d51f2cb3
-
SHA256
716e5a3d29ff525aed30c18061daff4b496f3f828ba2ac763efd857062a42e96
-
SHA512
5edd6b563c687a101786dd5e056d1c1392960b156492f8f1fe71140416361f14174dfdc1478b3b6616d591da7ab7114d594e6e765db047817886ce29cfca7247
-
SSDEEP
24576:qcFPyLyEv4NeAXD+Rk+p736lDEU4KgTfp:RQa+lKlDJgT
-
Danabot Loader Component
-
Danabot family
-
Blocklisted process makes network request
-