General
-
Target
41m98slk.exe
-
Size
4.5MB
-
Sample
250209-w2cqdayqe1
-
MD5
f9e90bb2c2cc243057e40440e49f3ed1
-
SHA1
69631cb253a757f61f5f894e6896740ee3808dc5
-
SHA256
bede457084899e1c6a0e0779ed1b4534add18fd2041724f4635360fda522b6da
-
SHA512
0ce38ca30c7ba8627d26dea32df685ef8be3c4be32dab4875fa9e1a48627cb2ad1038d9e08a92159ba69a7b6d6967fe36ab9d1645ed13a6d5f51193e1d828714
-
SSDEEP
98304:G5a9IjDIhxKtPTFELvmpuwPsz63Ob0lecb6UdLxeOQ:G5aG/x7Fmssz63MEeo75
Static task
static1
Behavioral task
behavioral1
Sample
41m98slk.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41m98slk.exe
Resource
win10ltsc2021-20250207-en
Malware Config
Extracted
danabot
49.0.50.0:57
51.0.52.0:0
53.0.54.0:1200
55.0.56.0:65535
-
type
loader
Targets
-
-
Target
41m98slk.exe
-
Size
4.5MB
-
MD5
f9e90bb2c2cc243057e40440e49f3ed1
-
SHA1
69631cb253a757f61f5f894e6896740ee3808dc5
-
SHA256
bede457084899e1c6a0e0779ed1b4534add18fd2041724f4635360fda522b6da
-
SHA512
0ce38ca30c7ba8627d26dea32df685ef8be3c4be32dab4875fa9e1a48627cb2ad1038d9e08a92159ba69a7b6d6967fe36ab9d1645ed13a6d5f51193e1d828714
-
SSDEEP
98304:G5a9IjDIhxKtPTFELvmpuwPsz63Ob0lecb6UdLxeOQ:G5aG/x7Fmssz63MEeo75
-
Danabot family
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Loads dropped DLL
-