General

  • Target

    de9a1e3fbb72d4a01fabee53230f2017.exe

  • Size

    442KB

  • Sample

    210721-emjcda9vwn

  • MD5

    de9a1e3fbb72d4a01fabee53230f2017

  • SHA1

    b7c3bad04551b68b408ef4eb3f9be2fab836d3db

  • SHA256

    0a3c1d6736893714d0e5552795fb8ba026ba2bd3f5e34afd975b9d463c1e46fe

  • SHA512

    e6f563f845c504a12aafab4dc7c773370157ac957d9de1bedf46a210c8def8bc93246cff4132efa7253ee6ee7846519ac540f65d301f7e734188a29101049b0b

Malware Config

Extracted

Family

danabot

Version

1987

Botnet

4

C2

142.11.244.124:443

142.11.206.50:443

Attributes
  • embedded_hash

    6AD9FE4F9E491E785665E0D144F61DAB

rsa_privkey.plain
rsa_pubkey.plain

Targets

    • Target

      de9a1e3fbb72d4a01fabee53230f2017.exe

    • Size

      442KB

    • MD5

      de9a1e3fbb72d4a01fabee53230f2017

    • SHA1

      b7c3bad04551b68b408ef4eb3f9be2fab836d3db

    • SHA256

      0a3c1d6736893714d0e5552795fb8ba026ba2bd3f5e34afd975b9d463c1e46fe

    • SHA512

      e6f563f845c504a12aafab4dc7c773370157ac957d9de1bedf46a210c8def8bc93246cff4132efa7253ee6ee7846519ac540f65d301f7e734188a29101049b0b

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks