General

  • Target

    2025-04-23_616487314c546ff3789f396786cdfdde_black-basta_elex_luca-stealer_remcos

  • Size

    6.5MB

  • Sample

    250423-tkegjassgs

  • MD5

    616487314c546ff3789f396786cdfdde

  • SHA1

    33d6d067e020d2688d180730fd4f9c1c961195d3

  • SHA256

    fbca91d5252eea48b2100d1e4e74900b7781a63b81f802eb6d4368b70cbd2977

  • SHA512

    f404c2dca72f74dd35fb3f6e6462cf7b86b15230241a40e13c61556d9a4c3925482407762ef02f7364e07c0a9a277fc7a8ef46bd3ec37b065ff78d2e94579922

  • SSDEEP

    98304:aQwjWm0/jJHSgz+MMZhhhBpBuQI4nGVHQn5C5P+lz+JYCUrfuzrbxIhZ:6AjJ7bohf/B3It2C5P+lmBUrfuzZIf

Malware Config

Extracted

Family

danabot

Botnet

4

C2

192.119.110.73:443

192.236.147.159:443

192.210.222.88:443

Attributes
  • embedded_hash

    F4711E27D559B4AEB1A081A1EB0AC465

  • type

    loader

rsa_pubkey.plain
rsa_privkey.plain

Targets

    • Target

      2025-04-23_616487314c546ff3789f396786cdfdde_black-basta_elex_luca-stealer_remcos

    • Size

      6.5MB

    • MD5

      616487314c546ff3789f396786cdfdde

    • SHA1

      33d6d067e020d2688d180730fd4f9c1c961195d3

    • SHA256

      fbca91d5252eea48b2100d1e4e74900b7781a63b81f802eb6d4368b70cbd2977

    • SHA512

      f404c2dca72f74dd35fb3f6e6462cf7b86b15230241a40e13c61556d9a4c3925482407762ef02f7364e07c0a9a277fc7a8ef46bd3ec37b065ff78d2e94579922

    • SSDEEP

      98304:aQwjWm0/jJHSgz+MMZhhhBpBuQI4nGVHQn5C5P+lz+JYCUrfuzrbxIhZ:6AjJ7bohf/B3It2C5P+lmBUrfuzZIf

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Danabot Loader Component

    • Danabot family

    • Blocklisted process makes network request

    • Loads dropped DLL

MITRE ATT&CK Enterprise v16

Tasks