General
-
Target
bfe3c1acffa85e36be3d987142265079_JaffaCakes118
-
Size
1.3MB
-
Sample
241204-aej1aaxjbj
-
MD5
bfe3c1acffa85e36be3d987142265079
-
SHA1
6999ac35308ce82cc4e1cb4ad6c068ab87cb0faf
-
SHA256
74439bdad07afe4c0ceb9c6dd7abff40f6590a0d2b721cf99faf3ba715480af6
-
SHA512
74cb1bcd7a02ec6692bd83f3181decbd102f4629f067053ee50a3f32e8d01109ca0508410aac9d550c126024469b428f2e64c943a62a6a1dc66294d48c53ec9d
-
SSDEEP
24576:dncFdAiAtFv3+x13TRnNeH60X+JN4m+TnTk0:KALGEzLrTL
Behavioral task
behavioral1
Sample
bfe3c1acffa85e36be3d987142265079_JaffaCakes118.dll
Resource
win7-20240903-en
Malware Config
Extracted
danabot
4
142.11.192.232:443
192.119.110.73:443
142.11.242.31:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Targets
-
-
Target
bfe3c1acffa85e36be3d987142265079_JaffaCakes118
-
Size
1.3MB
-
MD5
bfe3c1acffa85e36be3d987142265079
-
SHA1
6999ac35308ce82cc4e1cb4ad6c068ab87cb0faf
-
SHA256
74439bdad07afe4c0ceb9c6dd7abff40f6590a0d2b721cf99faf3ba715480af6
-
SHA512
74cb1bcd7a02ec6692bd83f3181decbd102f4629f067053ee50a3f32e8d01109ca0508410aac9d550c126024469b428f2e64c943a62a6a1dc66294d48c53ec9d
-
SSDEEP
24576:dncFdAiAtFv3+x13TRnNeH60X+JN4m+TnTk0:KALGEzLrTL
-
Danabot Loader Component
-
Danabot family
-
Blocklisted process makes network request
-