Analysis

  • max time kernel
    13s
  • max time network
    13s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    14-09-2020 01:26

General

  • Target

    elder.exe

  • Size

    2.3MB

  • MD5

    e4fc60d76aed36f58af4e8a02ac91887

  • SHA1

    59565273a6d014865b15e81fdbbed59fc56451f0

  • SHA256

    7a5bff709af4ad1e50840b0822a91edbec6ab2418e13ef1cdf30e3ea09228590

  • SHA512

    5e2653cae0d078f1ed4856b196f0956f78c40c270372e1104cdca9c5d86c8e2d17516164d6d9ab7779a038a36753a82f0c1de6b859d4d8e0582d9602c477f19a

Malware Config

Extracted

Family

danabot

C2

89.44.9.132

64.188.23.70

179.43.133.35

45.147.231.218

89.45.4.126

rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot x86 payload 6 IoCs

    Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

  • Blocklisted process makes network request 10 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\elder.exe
    "C:\Users\Admin\AppData\Local\Temp\elder.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\elder.dll f1 C:\Users\Admin\AppData\Local\Temp\elder.exe@1088
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1564
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\AppData\Local\Temp\elder.dll,f0
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        PID:1616

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\elder.dll
    MD5

    07119b1790f56250fff9f87e81b96fc2

    SHA1

    400e345b7566f4d7b8c5bd460b271864a934172d

    SHA256

    fd9fd627f781017c2e5b375a3ac6b7f3f6e2c081d0ea093f281043d83ef04f09

    SHA512

    26f852057938563c10c2289706b582c86622055041b47aae29a395947a1a457649b719630ec3c995d5edf4fd9a2c581ce4a52698fa3f7e1b9ce27b8728c87dfd

  • \Users\Admin\AppData\Local\Temp\elder.dll
    MD5

    07119b1790f56250fff9f87e81b96fc2

    SHA1

    400e345b7566f4d7b8c5bd460b271864a934172d

    SHA256

    fd9fd627f781017c2e5b375a3ac6b7f3f6e2c081d0ea093f281043d83ef04f09

    SHA512

    26f852057938563c10c2289706b582c86622055041b47aae29a395947a1a457649b719630ec3c995d5edf4fd9a2c581ce4a52698fa3f7e1b9ce27b8728c87dfd

  • \Users\Admin\AppData\Local\Temp\elder.dll
    MD5

    07119b1790f56250fff9f87e81b96fc2

    SHA1

    400e345b7566f4d7b8c5bd460b271864a934172d

    SHA256

    fd9fd627f781017c2e5b375a3ac6b7f3f6e2c081d0ea093f281043d83ef04f09

    SHA512

    26f852057938563c10c2289706b582c86622055041b47aae29a395947a1a457649b719630ec3c995d5edf4fd9a2c581ce4a52698fa3f7e1b9ce27b8728c87dfd

  • \Users\Admin\AppData\Local\Temp\elder.dll
    MD5

    07119b1790f56250fff9f87e81b96fc2

    SHA1

    400e345b7566f4d7b8c5bd460b271864a934172d

    SHA256

    fd9fd627f781017c2e5b375a3ac6b7f3f6e2c081d0ea093f281043d83ef04f09

    SHA512

    26f852057938563c10c2289706b582c86622055041b47aae29a395947a1a457649b719630ec3c995d5edf4fd9a2c581ce4a52698fa3f7e1b9ce27b8728c87dfd

  • \Users\Admin\AppData\Local\Temp\elder.dll
    MD5

    07119b1790f56250fff9f87e81b96fc2

    SHA1

    400e345b7566f4d7b8c5bd460b271864a934172d

    SHA256

    fd9fd627f781017c2e5b375a3ac6b7f3f6e2c081d0ea093f281043d83ef04f09

    SHA512

    26f852057938563c10c2289706b582c86622055041b47aae29a395947a1a457649b719630ec3c995d5edf4fd9a2c581ce4a52698fa3f7e1b9ce27b8728c87dfd

  • \Users\Admin\AppData\Local\Temp\elder.dll
    MD5

    07119b1790f56250fff9f87e81b96fc2

    SHA1

    400e345b7566f4d7b8c5bd460b271864a934172d

    SHA256

    fd9fd627f781017c2e5b375a3ac6b7f3f6e2c081d0ea093f281043d83ef04f09

    SHA512

    26f852057938563c10c2289706b582c86622055041b47aae29a395947a1a457649b719630ec3c995d5edf4fd9a2c581ce4a52698fa3f7e1b9ce27b8728c87dfd

  • memory/1088-0-0x00000000020A0000-0x00000000022C1000-memory.dmp
    Filesize

    2.1MB

  • memory/1088-1-0x00000000022D0000-0x00000000022E1000-memory.dmp
    Filesize

    68KB

  • memory/1564-2-0x0000000000000000-mapping.dmp
  • memory/1616-5-0x0000000000000000-mapping.dmp