General

  • Target

    cd40719a2a4b343268739b3d711437f4.exe

  • Size

    6.0MB

  • Sample

    210525-aba349pbjs

  • MD5

    cd40719a2a4b343268739b3d711437f4

  • SHA1

    dd207bf59d41c15eae9f0f5025f0bee87b21f782

  • SHA256

    f49f273f3ee41c8bfebed6c87c839335ae6ee8faa025f6ab67b6f9aec1569604

  • SHA512

    541f608c46460d16341ca38d4175c96e4b5f37d591b6511efdbb7de4d5da74c960cd415db1032e1041fc76ddb3f10985d5d6c5f239853db1543c8b6e4f1a091e

Malware Config

Extracted

Family

danabot

Version

1827

Botnet

3

C2

184.95.51.183:443

184.95.51.175:443

192.210.198.12:443

184.95.51.180:443

Attributes
  • embedded_hash

    AEF96B4D339B580ABB737F203C2D0F52

rsa_pubkey.plain
rsa_pubkey.plain

Targets

    • Target

      cd40719a2a4b343268739b3d711437f4.exe

    • Size

      6.0MB

    • MD5

      cd40719a2a4b343268739b3d711437f4

    • SHA1

      dd207bf59d41c15eae9f0f5025f0bee87b21f782

    • SHA256

      f49f273f3ee41c8bfebed6c87c839335ae6ee8faa025f6ab67b6f9aec1569604

    • SHA512

      541f608c46460d16341ca38d4175c96e4b5f37d591b6511efdbb7de4d5da74c960cd415db1032e1041fc76ddb3f10985d5d6c5f239853db1543c8b6e4f1a091e

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v6

Tasks