General

  • Target

    10b43e3a0ea62d2da4c09a1377ca8eba.exe

  • Size

    6.1MB

  • Sample

    210614-47byl5yhbx

  • MD5

    10b43e3a0ea62d2da4c09a1377ca8eba

  • SHA1

    7d03bb47e0284f6a139849c2190c16a0c0b68379

  • SHA256

    b76c0b97e9a444717580fdb3e3c26cd38ae42366761eda3b2a10868614eee0fe

  • SHA512

    f08937fe06930cf3dad6100f6bd6da5745fbe15968b0df4f6a351e384cc28387613ec45378ea1ef9d9e2bebedac3d40fa5a853ba85815c4c041113918fcd06a9

Malware Config

Extracted

Family

danabot

Version

1827

Botnet

3

C2

192.210.198.12:443

37.220.31.50:443

184.95.51.183:443

184.95.51.175:443

Attributes
  • embedded_hash

    410EB249B3A3D8613B29638D583F7193

rsa_pubkey.plain
rsa_pubkey.plain

Targets

    • Target

      10b43e3a0ea62d2da4c09a1377ca8eba.exe

    • Size

      6.1MB

    • MD5

      10b43e3a0ea62d2da4c09a1377ca8eba

    • SHA1

      7d03bb47e0284f6a139849c2190c16a0c0b68379

    • SHA256

      b76c0b97e9a444717580fdb3e3c26cd38ae42366761eda3b2a10868614eee0fe

    • SHA512

      f08937fe06930cf3dad6100f6bd6da5745fbe15968b0df4f6a351e384cc28387613ec45378ea1ef9d9e2bebedac3d40fa5a853ba85815c4c041113918fcd06a9

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

MITRE ATT&CK Enterprise v6

Tasks