General

  • Target

    B6F6C74F86A145460F03AC3A0520D3345FC7FCC1

  • Size

    8.9MB

  • Sample

    250221-ktjceaxqcs

  • MD5

    e1438c21e6de91615a6a5e2a48f274fc

  • SHA1

    b6f6c74f86a145460f03ac3a0520d3345fc7fcc1

  • SHA256

    9cbaec7eb2c14ecdc39095c2deae0c20cb42e9f28466307c44f5848de49a58ef

  • SHA512

    9be5f304259a2bbc488cde3a9a5cf09b2019a14e32538d79e88e3d1785bce5a3dcfca6702d235d5ec87b4bdf043f3c6a41762ccc2ba6fed8ee63366c0f2e0879

  • SSDEEP

    196608:9n520ZroZkRsj6N+gdC1fcmwz/MIpqPuJS8ErZ/0jCi:9n52eSFjG+aAfcRo4Kz8W0j

Malware Config

Extracted

Family

danabot

Attributes
  • embedded_hash

    5059953BB045843A520147F73664DC78

  • type

    loader

Targets

    • Target

      B6F6C74F86A145460F03AC3A0520D3345FC7FCC1

    • Size

      8.9MB

    • MD5

      e1438c21e6de91615a6a5e2a48f274fc

    • SHA1

      b6f6c74f86a145460f03ac3a0520d3345fc7fcc1

    • SHA256

      9cbaec7eb2c14ecdc39095c2deae0c20cb42e9f28466307c44f5848de49a58ef

    • SHA512

      9be5f304259a2bbc488cde3a9a5cf09b2019a14e32538d79e88e3d1785bce5a3dcfca6702d235d5ec87b4bdf043f3c6a41762ccc2ba6fed8ee63366c0f2e0879

    • SSDEEP

      196608:9n520ZroZkRsj6N+gdC1fcmwz/MIpqPuJS8ErZ/0jCi:9n52eSFjG+aAfcRo4Kz8W0j

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot family

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.