General

  • Target

    eufive_20210725-084051

  • Size

    1010KB

  • Sample

    210725-vdlm7pqxza

  • MD5

    1c52aed4df30df05a45966183eeef3c2

  • SHA1

    11f350112bdd668b11b2fb3849ef2b0c7c020bb4

  • SHA256

    152265b11b39688bfa5dd656dddacf87c01515f70f62aeb3b1406138a77986d5

  • SHA512

    7c30a710cdf9e7f7043b1e4a8a9c1af9e2c70570dd428691451f908b0f81f2f4c3c71f691a2174ba339b1b713baa3ace3f65820402a91225387923f848665ab6

Malware Config

Extracted

Family

danabot

Version

1987

Botnet

15

C2

192.52.166.169:443

173.254.204.95:443

192.52.167.45:443

Attributes
  • embedded_hash

    D6A9A294BFDC6F13BFCC2AB0FA9B54B9

rsa_privkey.plain
rsa_pubkey.plain

Targets

    • Target

      eufive_20210725-084051

    • Size

      1010KB

    • MD5

      1c52aed4df30df05a45966183eeef3c2

    • SHA1

      11f350112bdd668b11b2fb3849ef2b0c7c020bb4

    • SHA256

      152265b11b39688bfa5dd656dddacf87c01515f70f62aeb3b1406138a77986d5

    • SHA512

      7c30a710cdf9e7f7043b1e4a8a9c1af9e2c70570dd428691451f908b0f81f2f4c3c71f691a2174ba339b1b713baa3ace3f65820402a91225387923f848665ab6

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks