General
-
Target
JaffaCakes118_52f4174dad94afe8ebab2ad26e48720b
-
Size
1.3MB
-
Sample
250107-hbvxdaymdz
-
MD5
52f4174dad94afe8ebab2ad26e48720b
-
SHA1
a630b88f3870dbbc8a0bc41ead9c555c86744a2d
-
SHA256
6fd412b24c94302c0c556fd80075146074e01eb0d83bb87f01a20d181201188d
-
SHA512
933bb24aed78395df2d5a58d09bdb0040a1db173ec157001be6d54459175c39d3aaf01dd0f5386239d3122948ec2ac33e2489d8a6074d00038ccbfffcfbfb38f
-
SSDEEP
24576:/8pWEm4bqFd1leD0o8WVVld/uCNZCT0dCIQb:UcynDP/7ZCTOQb
Behavioral task
behavioral1
Sample
JaffaCakes118_52f4174dad94afe8ebab2ad26e48720b.dll
Resource
win7-20241010-en
Malware Config
Extracted
danabot
4
192.119.110.73:443
192.236.147.159:443
192.210.222.88:443
-
embedded_hash
F4711E27D559B4AEB1A081A1EB0AC465
-
type
loader
Targets
-
-
Target
JaffaCakes118_52f4174dad94afe8ebab2ad26e48720b
-
Size
1.3MB
-
MD5
52f4174dad94afe8ebab2ad26e48720b
-
SHA1
a630b88f3870dbbc8a0bc41ead9c555c86744a2d
-
SHA256
6fd412b24c94302c0c556fd80075146074e01eb0d83bb87f01a20d181201188d
-
SHA512
933bb24aed78395df2d5a58d09bdb0040a1db173ec157001be6d54459175c39d3aaf01dd0f5386239d3122948ec2ac33e2489d8a6074d00038ccbfffcfbfb38f
-
SSDEEP
24576:/8pWEm4bqFd1leD0o8WVVld/uCNZCT0dCIQb:UcynDP/7ZCTOQb
-
Danabot Loader Component
-
Danabot family
-
Blocklisted process makes network request
-