MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 da19555286a99fed6a4a84c0c4b76e793618299f6d4cc2fe31373ddc033d8dcc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



DanaBot


Vendor detections: 3


Intelligence 3 IOCs YARA 1 File information Comments

SHA256 hash: da19555286a99fed6a4a84c0c4b76e793618299f6d4cc2fe31373ddc033d8dcc
SHA3-384 hash: 54d9c305e0f1b6167e12fd82cda75486122ee292e0fa6f4bd6ae86c680654157aec43961c29cba87f133655a4e568f49
SHA1 hash: 337a5960609070877e4f7cc5cf43e3e99e2acdb9
MD5 hash: 034b9024337c8fa17443089fa9488ee0
humanhash: network-ack-maryland-neptune
File name:SecuriteInfo.com.Win32.Kryptik.HDJT.10984
Download: download sample
Signature DanaBot
File size:3'475'968 bytes
First seen:2020-05-15 17:32:39 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash 3c40312a17d7028c500c6468084c6a58 (7 x Gozi, 2 x DanaBot)
ssdeep 49152:vBB+DbwBoIK6d8kMvEOzzW2efqjnNXmUp+wtyQoI/M8VglMCXL1xFN/Zta2koOmE:vQDGa/maNWa+KwhxzHkczXTgdt
Threatray 17 similar samples on MalwareBazaar
TLSH CBF5DF107712D038F56B0A7AEC3ED4FA95287E459B3818D730C56E8F2633AD65872B1B
Reporter SecuriteInfoCom
Tags:DanaBot

Intelligence


File Origin
# of uploads :
1
# of downloads :
769
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Danabot
Status:
Malicious
First seen:
2020-05-15 17:35:36 UTC
File Type:
PE (Dll)
Extracted files:
1
AV detection:
19 of 31 (61.29%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
n/a
Behaviour
Suspicious use of WriteProcessMemory
Blacklisted process makes network request
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:win_danabot_auto
Author:Felix Bilstein - yara-signator at cocacoding dot com
Description:autogenerated rule brought to you by yara-signator

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments