lv.exe

General
Target

lv.exe

Size

4MB

Sample

210914-kw2a1afde8

Score
10 /10
MD5

1919bd531e95d9195dc53ee6af79ffc8

SHA1

65c2dfb3ad6ff0b3f1b33db143ec9a65ea64e2b0

SHA256

eb50c5447c789b7cab2a404cfbbd049c55fa70bc58783f2bb27df7d169474d27

SHA512

b00029cdfeac8266653f2fefe07e40815c14c811dce68fc95b821a408f8cf60489366a461a1def3d423747a2f5559ce6c1acaee16a795d893036d2a8226ae9c6

Malware Config

Extracted

Family danabot
C2

23.229.29.48:443

5.9.224.204:443

192.255.166.212:443

Attributes
embedded_hash
0E1A7A1479C37094441FA911262B322A
rsa_pubkey.plain
rsa_privkey.plain
Targets
Target

lv.exe

MD5

1919bd531e95d9195dc53ee6af79ffc8

Filesize

4MB

Score
10/10
SHA1

65c2dfb3ad6ff0b3f1b33db143ec9a65ea64e2b0

SHA256

eb50c5447c789b7cab2a404cfbbd049c55fa70bc58783f2bb27df7d169474d27

SHA512

b00029cdfeac8266653f2fefe07e40815c14c811dce68fc95b821a408f8cf60489366a461a1def3d423747a2f5559ce6c1acaee16a795d893036d2a8226ae9c6

Tags

Signatures

  • Danabot

    Description

    Danabot is a modular banking Trojan that has been linked with other malware.

    Tags

  • Danabot Loader Component

  • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    Tags

    TTPs

    Query RegistryVirtualization/Sandbox Evasion
  • Blocklisted process makes network request

  • Downloads MZ/PE file

  • Executes dropped EXE

  • Checks BIOS information in registry

    Description

    BIOS information is often read in order to detect sandboxing environments.

    TTPs

    Query RegistrySystem Information Discovery
  • Drops startup file

  • Loads dropped DLL

  • Themida packer

    Description

    Detects Themida, an advanced Windows software protection system.

    Tags

  • Checks whether UAC is enabled

    Tags

    TTPs

    System Information Discovery
  • Legitimate hosting services abused for malware hosting/C2

    TTPs

    Web Service
  • Looks up external IP address via web service

    Description

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger

  • Suspicious use of SetThreadContext

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Exfiltration
          Impact
            Initial Access
              Lateral Movement
                Persistence
                  Privilege Escalation
                    Tasks

                    static1