General

  • Target

    02a87432aa8362fae07a1f6f53e01635c45dce79453e057a899bcf1588b40763.zip

  • Size

    1.6MB

  • Sample

    210524-5c8tdzagg6

  • MD5

    8faed9affb3e83e8e73d7e3a09e5f41c

  • SHA1

    d2be977b56cec34ab283dab806f68dc709d1031a

  • SHA256

    f3a5b0f539135e55de5cbfe1f710b00c5e6823aa826732b96612dcd1f2373611

  • SHA512

    a5f0f1e732170030834cb1c83275ce813758e7ebb9ef835d817624893a1571275dc2343a3b859d74b84e1532e32980f415cc055a3f6b05b9cc306800a048f09d

Malware Config

Extracted

Family

danabot

Version

1827

Botnet

3

C2

184.95.51.183:443

184.95.51.175:443

192.210.198.12:443

184.95.51.180:443

Attributes
  • embedded_hash

    AEF96B4D339B580ABB737F203C2D0F52

rsa_pubkey.plain
rsa_pubkey.plain

Targets

    • Target

      02a87432aa8362fae07a1f6f53e01635c45dce79453e057a899bcf1588b40763

    • Size

      1.7MB

    • MD5

      ccc92a7d91a981fd54101e0e69b6bb64

    • SHA1

      767a3f8bf4e5808f1130175d4e117d261ec094f5

    • SHA256

      02a87432aa8362fae07a1f6f53e01635c45dce79453e057a899bcf1588b40763

    • SHA512

      809d6a5e1349aaf53fd1914e0ddc5a14cd94c432907a3c47f46e419991ca06af36a7105f2ddb8f3eca4442bf37371ed03eab1152b9828ea6be8fa6b900c3f27a

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks