General

  • Target

    SecuriteInfo.com.W32.AIDetect.malware1.29531.26956

  • Size

    6.0MB

  • Sample

    210527-5pm64xcgmj

  • MD5

    3a4f82c8bbd97fd7a8e6878c59921172

  • SHA1

    27064e3c2453f4833265e5d0751aab9dff57e3db

  • SHA256

    a0adb7d7f0a24b3882b1a9c4ce48c4ab23de093845dc6e949d6d036a64a33762

  • SHA512

    335c20baf0371c8ef9b55df7b9b712209b0553af020de88749e3e14028b2153cc2d099a95a98f8f9af43960275fae2517a4e7043dad6dcb29a388ec3ffc21f59

Malware Config

Extracted

Family

danabot

Version

1827

Botnet

3

C2

184.95.51.183:443

184.95.51.175:443

192.210.198.12:443

184.95.51.180:443

Attributes
  • embedded_hash

    AEF96B4D339B580ABB737F203C2D0F52

rsa_pubkey.plain
rsa_pubkey.plain

Targets

    • Target

      SecuriteInfo.com.W32.AIDetect.malware1.29531.26956

    • Size

      6.0MB

    • MD5

      3a4f82c8bbd97fd7a8e6878c59921172

    • SHA1

      27064e3c2453f4833265e5d0751aab9dff57e3db

    • SHA256

      a0adb7d7f0a24b3882b1a9c4ce48c4ab23de093845dc6e949d6d036a64a33762

    • SHA512

      335c20baf0371c8ef9b55df7b9b712209b0553af020de88749e3e14028b2153cc2d099a95a98f8f9af43960275fae2517a4e7043dad6dcb29a388ec3ffc21f59

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v6

Tasks