General

  • Target

    1.exe

  • Size

    1.7MB

  • Sample

    210531-442g4qqryn

  • MD5

    2332662eb831170dc8b914db0388f6ee

  • SHA1

    6dae44239a164218f9eac9c0b82cf70c30f2f5f5

  • SHA256

    f01f3642340b639740e35de9b45182fb802fe0001ca46e0383fa426c6a5bd227

  • SHA512

    f387f96c357f1d2fa971b5666a7c117086a325836344d74a716508ee73d2d58b4ef32827c21dda4b77d5878d3956d6a5509a2228e8076f770d87bc81be43c7ce

Malware Config

Extracted

Family

danabot

Version

1827

Botnet

3

C2

184.95.51.183:443

184.95.51.175:443

192.210.198.12:443

184.95.51.180:443

Attributes
  • embedded_hash

    AEF96B4D339B580ABB737F203C2D0F52

rsa_pubkey.plain
rsa_pubkey.plain

Targets

    • Target

      1.exe

    • Size

      1.7MB

    • MD5

      2332662eb831170dc8b914db0388f6ee

    • SHA1

      6dae44239a164218f9eac9c0b82cf70c30f2f5f5

    • SHA256

      f01f3642340b639740e35de9b45182fb802fe0001ca46e0383fa426c6a5bd227

    • SHA512

      f387f96c357f1d2fa971b5666a7c117086a325836344d74a716508ee73d2d58b4ef32827c21dda4b77d5878d3956d6a5509a2228e8076f770d87bc81be43c7ce

    • CryptBot

      A C++ stealer distributed widely in bundle with other software.

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks